Abstract is missing.
- Accelerating RF Autonomy for Uncertain EnvironmentsJohn Davies. 1 [doi]
- Analysis of Augmentation Methods for RF Fingerprinting under Impaired ChannelsCeren Cömert, Michel Kulhandjian, Omer Melih Gul, Azzedine Touazi, Cliff Ellement, Burak Kantarci, Claude D'Amours. 3-8 [doi]
- Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi SensingSteven M. Hernandez, Eyuphan Bulut. 9-14 [doi]
- Deep Learning-based Localization in Limited Data RegimesFrost Mitchell, Aniqua Baset, Neal Patwari, Sneha Kumar Kasera, Aditya Bhaskara. 15-20 [doi]
- Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep LearningShivenkumar Parmar, Xuyu Wang, Chao Yang 0025, Shiwen Mao. 21-26 [doi]
- Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF EmanationsMichael Hegarty, Yalin E. Sagduyu, Tugba Erpek, Yi Shi 0001. 27-32 [doi]
- Systems View to Designing RF Fingerprinting for Real-World OperationsScott Kuzdeba, Josh Robinson, Joseph M. Carmack, David Couto. 33-38 [doi]
- Automatic Machine Learning for Multi-Receiver CNN Technology ClassifiersAmir Hossein Yazdani Abyaneh, Marwan Krunz. 39-44 [doi]
- KNEW: Key Generation using NEural Networks from Wireless ChannelsXue Wei, Dola Saha. 45-50 [doi]
- MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined RadioJithin Jagannath, Kian Hamedani, Collin Farquhar, Keyvan Ramezanpour, Anu Jagannath. 51-56 [doi]
- Can You Hear It?: Backdoor Attacks via Ultrasonic TriggersStefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek. 57-62 [doi]
- Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal FabricationTao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu. 63-68 [doi]
- A Machine Learning-Driven Analysis of Phantom E911 CallsYang Hu, Batoul Taki, Waheed U. Bajwa, Manoop Talasila, Mukesh Mantan, Syed Anwar Aftab. 69-74 [doi]
- Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave NetworksYa Jiang, Long Jiao, Liang Zhao, Kai Zeng 0001. 75-80 [doi]
- Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal ControlJithin Jagannath, Keyvan Ramezanpour, Anu Jagannath. 81-86 [doi]