


default search action
42nd MILCOM 2024: Washington, DC, USA
- IEEE Military Communications Conference, MILCOM 2024, Washington, DC, USA, October 28 - Nov. 1, 2024. IEEE 2024, ISBN 979-8-3503-7423-0
- Andrew Ashdown, John J. Kelly, Jonathan D. Ashdown, Ian Kurzrock, Caden Turck, Francesco Restuccia:
Analyzing Power Correlation Distributions for Dynamic Spectrum Awareness in 5G Networks. 1-6 - Charles Wiame, Ken R. Duffy, Muriel Médard:
Error correction in interference-limited wireless systems. 1-6 - Arupjyoti Bhuyan, Xiang Zhang, Mingyue Ji:
Distributed and Secure Spectrum Sharing for 5G and 6G Networks. 1-5 - Yao Ma, Nadia Yoza-Mitsuishi, Susanna Mosleh, Jason Coder:
Optimizing the Tradeoff Between Incumbent Protection and Secondary Transmissions with AFC. 1-6 - Xinrui Li, R. Michael Buehrer, Steven W. Ellingson:
An Improved Weight Selection Algorithm for Interference Mitigation in Paraboloidal Reflector Antennas with Reconfigurable Rim Scattering. 1-7 - Li Wu, Walid A. Hanafy, Abel Souza, Tarek F. Abdelzaher, Gunjan Verma, Prashant J. Shenoy:
Enhancing Resilience in Distributed ML Inference Pipelines for Edge Computing. 1-6 - Amir Reza Ramtin, James Zachary Hare, L. Kaplan, Philippe Nain, Venugopal V. Veeravalli, Don Towsley:
Quickest Change Detection in the Presence of Covert Adversaries. 1-6 - Zhibin Zou, Xue Wei, Xin Tian, Genshe Chen, Aveek Dutta, Khanh Pham, Erik Blasch:
Joint Interference Cancellation with Imperfect CSI. 1-6 - Jiewei Feng, Ken R. Duffy, Muriel Médard:
Laplacian-ORBGRAND: Decoding for Impulsive Noise. 1-6 - Erik Perrins:
Spectrum-Efficient LDPC Codes for CPM. 1-8 - Sébastien Roy, Matthew C. Valent:
When URLLC is Worse than Rayleigh: Error Rates of Lomax Fading. 1-6 - Kin-Ping Hui, Damien Phillips, Asanka Kekirigoda, Alan Allwright, J. Andrew Zhang, Hao Zhang, Anh Tuyen Le, Beeshanga Abewardana Jayawickrama:
Unveiling MIMO Potential: A Prototype for Enhanced Tactical Communications with Interference Suppression. 1-6 - Samuel B. Brown, Harpreet S. Dhillon:
Improving Receiver Detection Performance Through NLOS/LOS Vision. 1-6 - Umakant Kulkarni, Sonia Fahmy:
Securing the Cloud-Native 5G Control Plane. 1-6 - Abhisek Jha, SeyedMohammad Kashani, Hossein Mohammadi, Andre Kirchner, Minglong Zhang, Rémi A. Chou, Sang Wu Kim, Hyuck M. Kwon, Vuk Marojevic, Taejoon Kim:
Enhancing NextG Wireless Security: A Lightweight Secret Sharing Scheme with Robust Integrity Check for Military Communications. 1-6 - Yerin Kim, Alexander Benvenuti, Bo Chen, Mustafa O. Karabag, Abhishek Ninad Kulkarni, Nathaniel D. Bastian, Ufuk Topcu, Matthew T. Hale:
Defining and Measuring Deception in Sequential Decision Systems: Application to Network Defense. 1-6 - Kevin Naranjo:
Performance of TDOA Localization Versus Relay Assisted Communication System. 1-6 - Brandon T. Hunt, Behrouz Farhang-Boroujeny:
Noncontiguous Channel Bonding in the High Frequency Band. 1-6 - Wasif J. Hussain, Gaurav Duggal, Harpreet S. Dhillon, R. Michael Buehrer:
Utility of Aged Measurements for Localization. 1-6 - Tim Pappa, Aadam Dirie, James Bradford:
Applying Models of Historical Mujahideen Ambushes and Raids to Cyber Deception Practitioner Design. 1-6 - Mostafa Ibrahim, Sabit Ekin:
Propeller Modulation Equalization via Reference Tones. 1-5 - Regan Williamson, A. A. Louis Beex, Joseph D. Gaeddert:
Detecting Weak Wideband Signals in Interference-Dominated Environments. 1-7 - Kennedy A. Lee, John R. Barry:
Opportunistic Power Control for Physical Layer Security. 1-6 - Lina Mroueh, Idowu Ajayi:
Bit Interleaved and Coded Modulation with Indexed Partitions for Physical Layer Security. 1-6 - Srihari Kamesh Kompella, Kemal Davaslioglu, Yalin E. Sagduyu, Sastry Kompella:
Augmenting Training Data with Vector-Quantized Variational Autoencoder for Classifying RF Signals. 1-6 - Xiang Cheng, Daniel J. Jakubisin, Hanchao Yang, Kumar Sai Bondada, Nishith D. Tripathi, Yaling Yang, Gustave Anderson, Jeffrey H. Reed:
Constellation-Based Detection for Frequency Spread OFDM Underlay. 1-6 - Xue Wei, Dola Saha, Anna Quach:
Exploiting Multi-Domain Features for Detection of Unclassified Electromagnetic Signals. 1-6 - Corentin Fonteneau, Matthieu Crussière, Alexis Bazin, Oudomsack Pierre Pasquero:
Rejection Capability of Anti-Jamming Wiener Filter for Multi-Tone Interference in DSSS Systems. 1-6 - Shuo Huang, Fred Jones, Nikolos Gurney, David V. Pynadath, Kunal Srivastava, Stoney Trent, Peggy Wu, Quanyan Zhu:
PsybORG+: Modeling and Simulation for Detecting Cognitive Biases in Advanced Persistent Threats. 1-6 - Utku Demir, Kemal Davaslioglu, Yalin E. Sagduyu, Tugba Erpek, Gustave Anderson, Sastry Kompella:
I-SCOUT: Integrated Sensing and Communications to Uncover Moving Targets in NextG Networks. 1-6 - Thang Xuan Pham, Alex R. Chiriyath, Arindam Dutta, Owen Ma, Andrew Herschfelt, Daniel W. Bliss:
High Performance Pipe-lined Architecture for Open FEC Encoder. 1-6 - Scott Enserink, Jia-Chi Samuel Chieh, Santanu Das, Sunoy Banerjee:
Maritime On-the-Move Troposcatter for Resilient Naval Communications. 1-6 - Nancirose Piazza, Bibek Upadhayay, Ronald Scarpa, Vahid Behzadan:
Large Language Models for Automatic Standardization of Cyber Deception Plans based on the Adversary Engagement Ontology. 1-5 - Kasun Prabhath, Sudharman K. Jayaweera:
Spectrum Utilization Efficiency Analysis in 3D UAV Networks. 1-6 - Karel Pärlin, Vincent Le Nir, Tommi Meriläinen, Aaron Byman, Marc Adrat, Taneli Riihonen:
Wideband Cooperative Jamming with Band-Limited Known-Interference Cancellation. 1-6 - Bohua Zou, Binqi Sun, Yigong Hu, Tomasz Kloda, Marco Caccamo, Tarek F. Abdelzaher:
A Performance Prediction-based DNN Partitioner for Edge TPU Pipelining. 1-6 - Dany Mestas, Thomas Delamotte, Hervé Legay, Andreas Knopp:
Distributed Array Processing for Multi-Platform Signal Intelligence. 1-6 - Parker Huggins, Alphan Sahin:
On the Optimal Radius and Subcarrier Mapping for Binary Modulation on Conjugate-Reciprocal Zeros. 1-6 - Alexander M. Berenbeim, Ramneet Kaur, Adam D. Cobb, Anirban Roy, Susmit Jha, Nathaniel D. Bastian:
Post-hoc Uncertainty Quantification for Neurosymbolic Artificial Intelligence. 1-6 - Michael M. Wise, Narasinga Rao Miniskar, Seth D. Hitefield, Mohammed M. Olama, Jeffrey S. Vetter:
COSMIC DAWN: Distributed Analysis of Wireless at Nextscale. 1-6 - Nathan Ng, Abel Souza, Suhas N. Diggavi, Niranjan Suri, Tarek F. Abdelzaher, Don Towsley, Prashant J. Shenoy:
Collaborative Inference in Resource-Constrained Edge Networks: Challenges and Opportunities. 1-6 - Brian Wang, Julian de Gortari Briseno, Liying Han, Henry Phillips, Jeffrey Craighead, Ben Purman, Lance M. Kaplan, Mani Srivastava:
Adapting Complex Event Detection to Perceptual Domain Shifts. 1-6 - Lauren O. Lusk, Joseph D. Gaeddert:
Blind Interference Suppression using Polyphase Channelizers and Rank-Reduced Array Processing. 1-6 - Ashwini Pondeycherry Ganesh, Anthony Perre, Alphan Sahin, Ismail Güvenç, Brian A. Floyd:
A mmWave Software-Defined Array Platform for Wireless Experimentation at 24-29.5 GHz. 1-6 - Travis C. Cuvelier, Sean Ha, Maretta Morovitz:
Elements of disinformation theory: cyber engagement via increasing adversary information consumption. 1-8 - Xiwen Kang, Huamei Chen, Genshe Chen, Kuo-Chu Chang, Thomas M. Clemons:
Joint Detection and Classification of Communication and Radar Signals in Congested RF Environments Using YOLOv8. 1-6 - Jules Burgat, Jean-Baptiste Doré, Joumana Farah, Matthieu Crussière:
Vulnerability Analysis of Dynamic Directional Modulations: a Multi-Sensor Receiver Attack. 1-6 - Nadia Yoza-Mitsuishi, Yao Ma, Jason Coder:
Interference Analysis of WLAN and 5G Coexisting with Fixed Satellite Services in the 6 GHz Band. 1-6 - Emily A. Nack, Morgan C. McKenzie, Nathaniel D. Bastian:
ACI-IoT-2023: A Robust Dataset for Internet of Things Network Security Analysis. 1-6 - Clement Kam, Joseph P. Macker, Yin Sun:
Reinforcement Learning over Noisy Channels: An Information Bottleneck Approach. 1-6 - Stephen N. Jenkins, Behrouz Farhang-Boroujeny:
Iterative MIMO Detection Using Stochastic Sampling. 1-6 - Haozhe Lei, Yunfei Ge, Quanyan Zhu:
ADAPT: A Game-Theoretic and Neuro-Symbolic Framework for Automated Distributed Adaptive Penetration Testing. 7-12 - Jacob Sander, Chung-En Johnny Yu, Brian Jalaian, Nathaniel D. Bastian:
Uncertainty-Quantified Neurosymbolic AI for Open Set Recognition in Network Intrusion Detection. 13-18 - Joseph Riem, Lei Zhang, Jingdi Chen, Henry Mackay, Tian Lan, Nathaniel D. Bastian, Gina C. Adam:
Co-Design of Decision Trees for Network Intrusion Detection at the Edge on Digital vs. Analog Hardware. 39-44 - Alessandro Amato, Alessandro Morelli, Mattia Fogli, Raffaele Galliera, Niranjan Suri:
Multi-Agent Reinforcement Learning for Distributed Workflow Orchestration at the Tactical Edge. 64-69 - Zihang Cheng, Naveed A. Abbasi, Jorge Gomez-Ponce, Jianzhong Charlie Zhang, Andreas F. Molisch:
Multipath Cluster Analysis for Device-to-Device Terahertz Outdoor Measurements. 105-110 - Kasun Karunanayake, Arjun Singh, Josep Miquel Jornet, Arjuna Madanayake:
PanTera: RF-SoC Testbed using PYNQ Platform for 147 GHz SDR with 64 Mbps at up to 2 km. 111-116 - Amina Fellan, Hubert Djuitcheu, Daniel Lindenschmitt, Hans D. Schotten:
Exploring Jamming Threats and Defense Mechanisms in future 6G Communication Systems. 117-122 - Karl L. Strecker, G. Levi Captain, Forrest Tuschhoff, Rajind Mendis, John F. O'Hara:
Detecting Small Targets With a Terahertz Radar. 123-128 - Dimitri Dessources, Samuel Appiah-Mensah, Connor Amato, Dhairya Parikh, Joseph D. Bull, Eric W. Burger:
5G/O-RAN Security Automated Testing. 129-134 - Harri Saarnisaari, Marko Höyhtyä, Heikki Rantanen, Juha Mäkelä:
Military Communications in the 6G Era: Finnish Perspective. 135-140 - Johannes F. Loevenich, Tobias Hürten, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes:
Towards Robust and Secure Autonomous Cyber Defense Agents in Coalition Networks. 152-157 - Johannes F. Loevenich, Erik Adler, Adrien Bécue, Alexander Velazquez, Konrad S. Wrona, Vasil Boshnakov, Jerry Falkcrona, Nils Nordbotten, Olwen L. Worthington, Juha Röning, Roberto Rigolin F. Lopes:
Training Autonomous Cyber Defense Agents: Challenges & Opportunities in Military Networks. 158-163 - Yann Gourlet, Thomas Lefeuvre, Johannes F. Loevenich, Tobias Hürten, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Roberto Rigolin F. Lopes:
BRETAGNE: Building a Reproducible and Efficient Training AI Gym for Network Environments. 164-169 - Erik Adler, Johannes F. Loevenich, Linnet Moxon, Tobias Hürten, Florian Spelter, Johannes Braun, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes:
Exploring the Potential of Large Language Models for Red Teaming in Military Coalition Networks. 170-175 - Tobias Hürten, Johannes F. Loevenich, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes:
Hierarchical Multi-Agent Reinforcement Learning for Autonomous Cyber Defense in Coalition Networks. 176-181 - Kasper Cools, Clara Maathuis:
Trust or Bust: Ensuring Trustworthiness in Autonomous Weapon Systems. 182-189 - Konrad S. Wrona, Oliwer Sobolewski, Joanna Sliwa, Miroslaw Kutylowski, Przemyslaw Kubiak, Gabriel Wechta, Adrian Cinal, Mateusz Lesniak, Michal Wronski:
Quantum-Resistant One-to-One Communication for Underwater Acoustic Networks. 190-195 - Oliwer Sobolewski, Konrad S. Wrona, Adrian Cinal, Gabriel Wechta, Joanna Sliwa, Mateusz Lesniak, Michal Wronski, Miroslaw Kutylowski, Przemyslaw Kubiak:
Quantum-Resistant Key Management for Underwater Acoustic Multicast Communication. 196-201 - Bhawana Poudel Devkota, Lucas Saunders, Raju Dhakal, Laxima Niure Kandel:
GPS Spoofing Detection with a Random Forest Multiclass Classifier. 202-208 - Galamo F. Monkam, Nathaniel D. Bastian:
Model Poisoning Detection via Forensic Analysis. 209-214 - Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez:
Co-Synthesis of Code and Formal Models Using Large Language Models and Functors. 215-220 - Cemil Vahapoglu, Timothy J. O'Shea, Tamoghna Roy, Sennur Ulukus:
Deep Learning Based Joint Multi-User MISO Power Allocation and Beamforming Design. 239-244 - Andrew Arash Mahyari:
Harnessing the Power of LLMs in Source Code Vulnerability Detection. 251-256 - Sahaj K. Jha, Naveed A. Abbasi, Seun Sangodoyin:
Modeling of THz Propagation in a Congested Workbench Environment Towards 6G D2D Systems. 263-269 - John F. O'Hara, Karl L. Strecker, G. Levi Captain, Forrest Tuschhoff, Rajind Mendis, Mark D'Agostino, Joseph Gates:
Long-Distance, Multi-Gigabit-Per-Second Terahertz Wireless Communication. 270-275 - Laxmi Chapagain, Shuai Nie:
Design and Characterization of Dual-Band Complementary Split-Ring Resonator Array in the D-Band for 6G Wireless Networks. 276-281 - Pulok Tarafder, Imtiaz Ahmed, Danda B. Rawat, Ramesh Annavajjala, Kumar Vijay Mishra:
Deep Learning Model-Based Channel Estimation for THz Band Massive MIMO with RF Impairments. 282-287 - Trey Crump, Sastry Kompella, Clement Kam, Leandros Tassiulas:
SAR Data Generation Using Denoising Diffusion Probabilistic Models. 288-293 - Maryam Farajzadeh Dehkordi, Bijan Jabbari:
Joint Long-Term Processed Task and Communication Delay Optimization in UAV-Assisted MEC Systems Using DQN. 294-299 - Hanchao Yang, Connor McPeak, Rakesh Nagampally, Nishith D. Tripathi, Gustave Anderson, Jeffrey H. Reed, Yaling Yang, Daniel J. Jakubisin:
Agile 5G Networks: Advance Traffic Steering xAPP for Interference Mitigation. 300-305 - Samuel B. Brown, Stephen Young, Adam Wagenknecht, Daniel Jakubisin, Charles E. Thornton, Aaron Orndorff, William C. Headley:
Aircraft Radar Altimeter Interference Mitigation Through a CNN-Layer Only Denoising Autoencoder Architecture. 306-311 - Charles Montes, Ashkan Beigi, Armani Tayeh, Ruolin Zhou:
Bio-Inspired Neural Group Testing for Scalable Inference in Sparse Radar Detection. 312-317 - James C. Morrison, Nathan Schatz, Seungnyun Kim, Girim Kwon, Bernardo Camajori Tedeschini, Vijitha Weerackody, Andrea Conti, Moe Z. Win:
Sidelink-Enabled Cooperative Localization for xG Non-Terrestrial Networks. 318-323 - Don-Roberts Emenonye, Harpreet S. Dhillon, R. Michael Buehrer:
Is 9D localization possible with unsynchronized LEO Satellites? 324-329 - Don-Roberts Emenonye, Harpreet S. Dhillon, R. Michael Buehrer:
Joint 9D Receiver Localization and Ephemeris Correction with LEO and 5G Base Stations. 330-335 - Alessandro Vaccari, Moe Z. Win, Andrea Conti:
Tracking and Identification of Targets via mmWave MIMO Radar. 336-341 - Zaheen E. Muktadi Syed, Murat Yuksel:
Randomized 3D Neighbor Discovery with Mechanically Steered FSO Transceivers. 342-347 - Robert Starr, Sean Ha, Gavin Smith:
Operating System Fingerprint Forgery with Data-Plane Programming for Network-level Cyber Deception and Adversary Engagement. 380-385 - Michael Vai, Shankararaman Ramakrishnan, Joseph Greco, Christopher Hayes, Lori L. Jeromin, Todd Ulmer, John Moores, Jonah Tower, Michael Butterfield, Gregory Kuperman:
Security-by-Design for Cross-Constellation Satellite Communications. 386-391 - Ryan Longwell, Abbie Cliche, James Brock, Jason Dahlstrom, Stephen Taylor:
Securing SoC Processors by Routing Memory Transactions Through FPGA Fabric. 392-398 - Brandon John, Erez Binyamin, Brendan Mulholland:
RAMBLE: Bluetooth Low Energy from DDR5 Memory Buses. 399-404 - Sharif Ullah, Sachin Shetty, Abdul Rahman, Amin Hass, Xiaoyong Yuan:
TTPatternMiner: Automated Learning and Characterization of Attack Pattern from Malicious Cyber Campaign. 405-411 - Tom Wray, Ying Wang:
5G Specifications Formal Verification with Over-the-Air Validation: Prompting is All You Need. 412-418 - Chethan Kumar Anjinappa, Dennis Hui, Kumar Balachandran:
Deep Learning based Jammer Localization in Mobile Communication Networks. 419-424 - Xiaolei Guo, Shunliang Zhang, Yinlong Liu:
Deep Reinforcement Learning Based Secrecy Performance Optimization for Aerial IRS-Assisted Communications. 425-430 - Tianyi Zhao, Benjamin W. Domae, Connor Steigerwald, Luke B. Paradis, Tim Chabuk, Danijela Cabric:
Drone RF Signal Detection and Fingerprinting: UAVSig Dataset and Deep Learning Approach. 431-436 - Junghwan John Rhee, Fei Zuo, Cody Tompkins, Jeehyun Oh, Yung Ryn Choe:
GrizzlyBay: Retroactive SBOM with Automated Identification for Legacy Binaries. 437-444 - Derrick Dominic, W. Joseph Durkin, Masoud Farshchian, Harris Zebrowitz, Amy Baker, Fredrick Howard:
Machine Learning Prediction of Multi-Band Clutter Loss using Deep Neural Networks. 445-450 - Jung-Fu Thomas Cheng, Atieh Rajabi Khamesi, Yufei W. Blankenship:
Complex-Valued Neural Networks for Distributed Machine Learning Assisted RF Positioning. 451-456 - Lorenzo Colombi, Simon Dahdal, Edoardo Di Caro, Roberto Fronteddu, Alessandro Gilli, Alessandro Morelli, Filippo Poltronieri, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli:
Efficient Data Dissemination via Semantic Filtering at the Tactical Edge. 457-462 - Ming Shi, Yingbin Liang, Ness B. Shroff:
Designing Near-Optimal Partially Observable Reinforcement Learning. 463-468 - Hyunsang Cho, Seonghoon Yoo, Bang Chul Jung, Joonhyuk Kang:
Enhancing Battlefield Awareness: An Aerial RIS-assisted ISAC System with Deep Reinforcement Learning. 469-474 - Matthias Schäfer, Yago Lizarribar, Gérôme Bovet, Dieter Verbruggen:
Let's Take This Upstairs: Localizing Ground Transmitters With High-Altitude Balloons. 475-480 - Cherry Y. Wakayama, Randall S. Plate, Danielle F. Morey, Zelda B. Zabinsky:
Designing a Communication Relay Network for Multi-Domain Maritime Operations. 481-486 - Ian Ellis Lamptey Hulede, Amitav Mukherjee, Jonathan D. Ashdown:
Hierarchical Adaptation of Multiagent Deep Reinforcement Learning for Multi-Domain Uncrewed Aerial and Ground Vehicle Coordination. 487-492 - Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analyzing Cache Timing-based Side Channel Vulnerability through Cache Line Composition. 517-522 - Theo Gasteiger, Pericle Perazzo, Markus Schuß, Carlo Alberto Boano, Fikret Basic, Gianluca Dini, Kay Römer:
BACON: Improving Broadcast Audio Authentication. 523-529 - Jinglong Guo, Yanyun Xu, Meng Zhang, Weiqing Huang, Huadong Guo:
Behavior Recognition and Anomaly Detection Utilizing Memory Electromagnetic Emanation. 530-535 - Jim Luo, Alexander Velazquez:
Blockmesh Data Security and Trust Framework for Tactical Networks. 536-541 - Thies Möhlenhof, Norman Jansen:
Decentralized Cooperative Multi-Agent Deep Reinforcement Learning for Real-Time Optimization of Emulated Ad-Hoc Radio Networks. 542-547 - Caleb M. Bowyer, John M. Shea, Tan F. Wong, Warren E. Dixon:
Optimizing Synchronization Times for Tracking a Mobile Asset in GPS-denied Environments using Deep Q-Learning. 548-553 - Noel Teku, Ravi Tandon, Tamal Bose:
Semi-decentralized Message Allocation for Cell-Free Networks using Unsupervised Learning. 554-559 - Madan Dahal, Mojtaba Vaezi:
Enhancing Interference Mitigation via Hybrid Action Space Control Deep Reinforcement Learning. 560-565 - Shilan He, Kyo Hyun Kim, Matthew Caesar, Jae Kim, Josh D. Eckhardt, Greg Kimberly:
Obstacle-Aware UAV Swarm Deployment for User Coverage Using Deep Reinforcement Learning. 566-571 - Justin Hynes, Alejandro Marcovich, Gustavo Vejarano:
Open-Source Quadcopter for Autonomous UAV Networks for Surveillance using Zigbee Radios and Thermal Imaging. 572-577 - Umair Ahmad Mughal, Rachad Atat, Muhammad Ismail:
Graph Neural Network-Based Intrusion Detection System for a Swarm of UAVs. 578-583 - Tianhao Yu, Matthew Caesar, Shadman Saqib Eusuf:
D-planner: An Efficient Surrounding-aware Multi-drone System for Urban Monitoring. 584-589 - Samuel Nathanson, Yungjun Yoo, David Na, Yinzhi Cao, Lanier Watkins:
A Step Towards Modern Disinformation Detection: Novel Methods for Detecting LLM-Generated Text. 615-620 - Yungjun Yoo, David Na, Samuel Nathanson, Yinzhi Cao, Lanier Watkins:
Disinformation at Scale: Detecting AI-Human Composite Images via Convolution Ensembles. 621-626 - MahmudaAkter Keya, Xionglin Zu, Jiawei Yuan, Yaqi He, Kai Zeng, Long Jiao:
Fine-Grained Location Privacy Protection in 6G ISAC Systems Using Deep Learning. 627-632 - Laura L. Pullum, Sumit Kumar Jha, Rickard Ewetz:
Intelligence, Surveillance and Reconnaissance Task Specifications in Temporal Logics. 633-638 - Arupjyoti Bhuyan, Marius Gheorghevici:
Real-world Demonstration of Secure 5G Roaming for Military Communications. 639-640 - Sven Wittig, Rodrigo Hernangómez, Karen Vardanyan, Ramez Askar, Amr Haj-Omar, Michael Peter, Slawomir Stanczak:
Demonstration of a Real-Time Testbed for D-Band Integrated Sensing and Communication. 641-642 - Robert G. Maunder, Lam Wui Kin, David Harvey:
Demonstration of 5G non-terrestrial network regenerative L1 processing. 645-646 - Alexander Marder, Jon Larrea, kc claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie:
AVOID: Automatic Verification Of Internet Data-paths. 647-648 - Shyam Yadati, Bryan Crompton, Dap Tran, Dukhyun Kim, Apurva Mody:
Demo: AiR Cognitive Agent Platform for Robust & Resilient Heterogeneous Wireless Networks. 649-650 - Rajeev Gangula, Andrea Lacava, Michele Polese, Salvatore D'Oro, Leonardo Bonati, Florian Kaltenberger, Pedram Johari, Tommaso Melodia:
Listen-While-Talking: Toward dApp-based Real-Time Spectrum Sharing in O-RAN. 651-652 - Sunday Amatare, Gaurav Singh, Aavash Kharel, Debashri Roy:
Real-Time Localization of Objects using Radio Frequency Propagation in Digital Twin. 653-654 - Sean Furman, Timothy Woods, Daniel O'Connor:
Demo Abstract: End-to-end Dynamic Spectrum Sharing on Open-Source 5G Testbed. 655-656 - Jamie Sloop, Evan Allen, Charles E. Thornton, Lingjia Liu, Fred Templin, Daniel J. Jakubisin:
A Demonstration of 5G Sidelink-Enabled MANETs Within CORE/EMANE Framework. 657-658 - William H. Clark, Thomas Coulon, Elliott Rheault, Alan J. Michaels:
Practical Waveform Generation and Labeling for Radio Frequency Applications. 659-660 - Elliott Rheault, Isaac Tucker, Jason Cox, Tyler Rodgers, William C. Headley:
Demoing Spectral Warrior: A Virtual Reality Gamification of Radio Frequency Concepts. 661-662 - Alison Keefe, Suresh Iyer:
Demonstration of Advanced Regenerative 5G NTN NR Satellite Base Station Prototype. 663-665 - S. Johnson, Morriel Kasher, R. Aggarwal, J. Callinan, M. Elo, Predrag Spasojevic, Fikadu T. Dagefu, J. Kong, J. Choi, B. Kim:
Experimental Analysis of Covert CDMA Against Energy and Cycle Detecting Adversaries. 666-667 - Ian Ellis Lamptey Hulede, Manu Dwivedi, Oscar Venegas, Saeede Enayati, Akhash Subramanian Shunmugam, Amitav Mukherjee:
Demonstration of Person Presence Detection Using 5G Synchronization Signals on SDR Testbed. 668-669 - Husheng Li, Zhu Han, H. Vincent Poor:
Waveform Shaping in Integrated Sensing and Communications. 670-671 - Connor McPeak, Kumar Sai Bondada, Nishith D. Tripathi, Gus Anderson, Jeffrey H. Reed, Daniel J. Jakubisin:
Demonstration of 5G DCI Obfuscation with a Spread Underlay. 672-673 - Connor McPeak, Rakesh Reddy Nagampally, Hanchao Yang, Nishith D. Tripathi, Gus Anderson, Jeffrey H. Reed, Daniel J. Jakubisin:
Enhancing 5G Spectrum Agility Through O-RAN xApp Initiated Handovers. 674-675 - RaviKanth Pasumarthy, Rajat Kapoor:
Demonstration of 5G NTN Solution based on O-RAN Architecture. 676-677 - Colin Funai, Christopher VanderValk, Syed Naqvi, Bishal Thapa:
Opportunistic eXtemporarY 5G Encrypted Networks (OXYGEN) with Sidelinks. 678-679 - Hossein Mohammadi, Minglong Zhang, Abhisek Jha, Vuk Marojevic, Remi A. Chou, Taejoon Kim:
Fortifying 5G Networks: Defending Against Jamming Attacks with Multipath Communications. 680-681 - Saketh Poduvu, Roshan Lal Neupane, Alicia Esquivel Morel, Reshmi Mitra, Vijay Anand, Rohit Chadha, Prasad Calyam:
Demonstration of Low-overhead Zero Trust at the Tactical Warfighting Edge. 682-683 - Neel Pandeya, Amr Haj-Omar, Aditya Dhananjay, Michael Zappe:
5G ORAN O-RU Emulator Implemented on the USRP SDR in the FR1 and FR3 Bands. 684-685 - Abida Sultana, Fahim Bashar, Mayukh Roy Chowdhury, Aloizio Pereira da Silva:
A Software-Defined Radio based O-RAN Platform for xApp Conflict Detection and Mitigation. 686-687 - Tryggve Svensson, Ema Becirovic:
One-Shot Modulation Recognition Using Artificial Modulation Types for Enhanced Meta-Learning. 688-694 - Mohamed K. M. Fadul, Donald R. Reising:
Using Deep Learning to Combat Pilot Jamming in SISO OFDM-based Wireless Networks. 695-702 - Zhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, Kevin S. Chan:
Joint Optimization of Task Offloading and Resource Allocation in Tactical Edge Networks. 703-708 - Brian Kim, Justin Kong, Terrence J. Moore, Fikadu T. Dagefu:
Reinforcement Learning Based Covert Routing with Node Failure Resiliency for Heterogeneous Networks. 709-714 - Xiangxiang Xu, Lizhong Zheng:
Multiuser Detection With Neural Feature Learning. 715-720 - Bahman Abolhassani, Atilla Eryilmaz, Y. Thomas Hou:
Model-Based and Model-Free Learning-Based Caching for Dynamic Content. 721-727 - Emil P. Andersen, Jesper R. Goksør, Sindre E. Halleraker, Frank T. Johnsen, Simen Kvalø, Ole P. Myhre, Tobias S. Omdal, Herman H. Seternes, Leander S. Thorstad:
AI-enabled Audio and Chat Collaboration Services. 728-733 - Hesham Fouad, Alexander Velazquez, Ira S. Moskowitz:
A Dynamical Systems Approach for Detecting Cyberattacks in Software-Defined Networks. 734-739 - Kemal Davaslioglu, Sastry Kompella, Tugba Erpek, Yalin E. Sagduyu:
Continual Deep Reinforcement Learning to Prevent Catastrophic Forgetting in Jamming Mitigation. 740-745 - Alan Gatherer, Chaitali Sengupta, Sudipta Sen, Jeffery H. Reed:
Dual-Use Commercial and Military Communications on a Single Platform using RAN Domain Specific Language. 746-751 - Wenhan Zhang, Meiyu Zhong, Ravi Tandon, Marwan Krunz:
Filtered Randomized Smoothing: A New Defense for Robust Modulation Classification. 789-794 - Zachary Schutz, Daniel J. Jakubisin, Charles E. Thornton, R. Michael Buehrer:
Linear Jamming Bandits: Learning to Jam 5G-based Coded Communications Systems. 795-800 - Matthew Yudin, Rauf Izmailov:
DBMAP: Detecting Backdoors via Modality-Agnostic Perturbations. 801-806 - Matthew Yudin, Yingbo Song, Constantin Serban, Ritu Chadha:
Exposing Vulnerabilities in PDF Malware Detectors to Evasion Attacks. 807-814 - Shahriar Rifat, Michael DeLucia, Ananthram Swami, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
ADA: Adversarial Dynamic Test Time Adaptation in Radio Frequency Machine Learning Systems. 815-820 - Milin Zhang, Michael DeLucia, Ananthram Swami, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
HyperAdv: Dynamic Defense Against Adversarial Radio Frequency Machine Learning Systems. 821-826 - Han Jun Yoon, David Soon, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Dongseong Kim, Frederica F. Nelson, Jin-Hee Cho:
Intrusion Response System for In-Vehicle Networks: Uncertainty-Aware Deep Reinforcement Learning-based Approach. 827-832 - Baki Berkay Yilmaz, Angelos D. Keromytis:
Resilience Analysis of Electromagnetic Side-channels against Weight Perturbations. 833-838 - Saketh Poduvu, Roshan Lal Neupane, Alicia Esquivel Morel, Reshmi Mitra, Vijay Anand, Rohit Chadha, Prasad Calyam:
Task-Based Access Control for Computation and Communication in the Tactical Warfighting Edge. 839-846 - Kyle Stein, Andrew Arash Mahyari, Guillermo A. Francia III, Eman El-Sheikh:
Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach. 847-852 - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez:
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls. 853-858 - Gavin Parpart, Jonathan H. Tu, Bradley D. Clymer, Jung Lee, Jasen Babcock:
Transformer Masked Autoencoders for RF Device Fingerprinting. 859-862 - Gaspard Baye, Priscila Silva, Alexandre Broggi, Nathaniel D. Bastian, Lance Fiondella, Gökhan Kul:
varMax: Towards Confidence-Based Zero-Day Attack Recognition. 863-868 - Miquel Sirera Perelló, Joshua Groen, Wan Liu, Stratis Ioannidis, Kaushik R. Chowdhury:
JARVIS: Disjoint Large Language Models on Radio VLANs for Intelligent Services. 869-874 - Ian Harshbarger, Colin Zejda, Marco Levorato:
Condar: Context-Aware Distributed Dynamic Object Detection on Radar Data. 875-880 - Katarina Vuckovic, Saba Mohammad Hosseini, Nazanin Rahnavard:
Revisiting Performance Metrics for Multimodal mmWave Beam Prediction Using Deep Learning. 881-887 - Xuezhi Wang, Oliver Kirkpatrick, Joseph O'Leary, Jeewani Kodithuwakkuge, Qiang Sun, Kamran Ghobani, Andrew D. Greentree, Bill Moran:
Beam tracking between LEO satellites for mmWave communications. 888-893 - Purna B. Samal, Dushmantha N. Thalakotuna, Karu Priyathama Esselle, Jeewani Kodithuwakkuge, Ediz Cetin:
Subarray Antenna Design for Inter-Satellite Communication Link at 60 GHz with Digital Beamforming. 894-899 - Jonathon H. Copley, Vincent W. S. Chan:
Adaptive Random Access Satellite Communication in the Presence of Interference. 900-907 - Nathan Schatz, Seungnyun Kim, Girim Kwon, Bernardo Camajori Tedeschini, Michael Ricard, Tyler Klein, Vijitha Weerackody, Andrea Conti, Moe Z. Win:
Location Verification in Next-Generation Non-Terrestrial Networks. 908-913 - Hassan El Alami, Danda B. Rawat:
Reinforcement Learning-enabled Satellite Constellation Reconfiguration and Retasking for Mission-Critical Applications. 938-943 - Vignesh Manohar, Craig Kleski, Rajesh Rasalkar, Raj Sengupta:
RL Based UAV Trajectory Optimization to Avoid Jammers and Optimize Wireless Connectivity. 944-949 - Hongmiao Yu, Shaoyu Tu, K. K. Ramakrishnan, N. Abu-Ghazaleh, Xinyu Zhang, Ananthram Swami:
M&M: Machine-Learning Enhanced MPQUIC for Resilient Communication with mmWave Networks. 950-955 - Jingda Yang, Ying Wang:
Trustworthy Formal Verification in 5G Protocols: Evaluating Generative and Classification Models for Relation Extraction. 956-962 - Jiarui Li, Shucheng Yu:
Efficient Multi-Authority ABE from Learning With Errors Over Rings. 963-968 - Jeffrey J. Hughes, Ben Nahill, Eric Simpson, Jeffery Lim, Ryan Burrow, John Dean, Brian Lee, Michael Vai, Roger Khazan, Sean R. O'Melia, Andrew Ho, Michael Parrish, Jeffrey Womack, Scott Trotter, Maria Lodico:
High Assurance Multi-Function Crypto Development. 969-974 - Mariam Gado, Muhammad Ismail:
Joint Server, Source Rate, and Link Allocation Strategy for Semi-QKD in Power Systems. 975-980 - Stefan Tschimben, Isabella Bates, Rucha Khairnar, Joanna Crosby, James H. Curry, Keith D. Gremban:
Military Decoys for the Digital Age. 981-986 - Fan Yang, Yupeng Cao, Bingyang Wen, Cristina Comaniciu, K. P. Subbalakshmi:
Fed-FIDS: A Efficient Federated Learning-based Intrusion Detection Framework. 987-992 - Olusola Tolulope Odeyomi, Austin Smith, Adrienne Whitmore, Oluwadoyinsola Ige, Kaushik Roy:
Personalized Online Federated Learning With Differential Privacy in Constrained Environments: A Meta-Learning Approach. 993-998 - Jiarui Li, Nan Chen, Shucheng Yu, Thitima Srivatanakul:
Efficient and Privacy-Preserving Integrity Verification for Federated Learning with TEEs. 999-1004 - Yushu Yan, Xiangyu Chang, Amit K. Roy-Chowdhury, Srikanth Krishnamurthy, Ananthram Swami, Basak Guler:
Clustered Federated Learning for Massive MIMO Power Allocation. 1005-1010 - Anthony Castañares, Deepak K. Tosh:
Intent-based Network Slice Reconfiguration for Elastic Battlefield Communication. 1028-1033 - Lorenzo Campioni, Alessandro Morelli, Roberto Fronteddu, Tatum Hackler, Niranjan Suri:
Network-Aware Traffic Shaping for Information Management Systems. 1034-1039 - Taposh Kumer Sarker, Deepak K. Tosh:
Low latency and resilient industrial network with next generation SDN and PLC virtualization. 1040-1045 - Cariappa K. S, Swastik Brahma, Anthony Macera:
Overselling Spectrum Slices in Radio Access Networks (RANs): An Optimal Auction Design Perspective. 1046-1051 - Jonathan Goohs, Josiah Dykstra, Anthony Melaragno, William Casey:
A Game Theory for Resource-Constrained Tactical Cyber Operations. 1052-1057 - Donald Greene, Zahir Khan, Angelos D. Keromytis, Baki Berkay Yilmaz:
Heterogeneous IC Component Identification via EM Side-channels. 1058-1063 - Ian Smith, Francesco Bertolaccini, William Tan, Michael D. Brown:
IRENE: A Toolchain for High-level Micropatching through Recompilable Sub-function Regions. 1064-1069 - Xuanli Lin, Zhaofeng Zhang, Yinxin Wan, Ethan Teo, Guoliang Xue, Yanchao Zhang:
Most Vulnerable Attack Trace in a Probabilistic Attack Graph. 1070-1075 - Saleh Darzi, Attila Altay Yavuz:
Privacy-Preserving and Post-Quantum Counter Denial of Service Framework for Wireless Networks. 1076-1081 - Gengwang Li, Min Yu, Dongliang Fang, Gang Li, Xiang Meng, Jianguo Jiang, Weiqing Huang:
X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation. 1082-1087 - Wei Fan, Bingnan Shi, Cheng Peng:
NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities. 1088-1093 - Yongkyu Jang, Minglong Zhang, Andre Kirchner, Bryan A. Jones, Vuk Marojevic, Taejoon Kim, David J. Love:
Optimization of Error Pattern Embedding Steganography within Error-Correcting Code Frameworks. 1094-1099 - Mahmudul Hassan Ashik, Moinul Hossain, Jeffrey N. Twigg, Fikadu T. Dagefu:
Phantom Guard: An MDP-Based Anti-Jamming Defense Strategy for Military 5G Networks. 1100-1105 - Alexander Marder, Jon Larrea, kc claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie:
REVEAL: Real-time Evaluation and Verification of External Adversarial Links. 1106-1111 - Xi Zhang, Qixuan Zhu:
Statistical Security-QoS Provisioning for mURLLC Over Massive-MIMO Based 6G Mobile Wireless Networks Using FBC. 1112-1117 - Scott L. Miller, Alex Sprintson:
Towards Secure Physical Layer Signal Processing. 1118-1123 - Iordanis Koutsopoulos:
Optimal Fidelity-Aware Entanglement Distribution in Linear Quantum Networks. 1124-1129 - Shiva Acharya, Shaoran Li, Yubo Wu, Nan Jiang, Wenjing Lou, Y. Thomas Hou:
Rudra: An Algorithm for Optimizing Spectrum Efficiency with Data Rate Guarantee in Next-G Communications. 1130-1137 - Tianjie Hu, Jindi Wu, Qun Li:
Dynamic Routing in Space-Ground Integrated Quantum Networks. 1138-1143 - Arnab Das, Paul Fritschen, Fazal Mahmood:
Developing Quality of Service Mechanisms for Telemedicine in Constrained Battlefield Environments. 1144-1149 - Naru Jai, Yi Shi, Wenjing Lou, Luiz A. DaSilva, Y. Thomas Hou:
Out-of-Band Interference Management to Protect Radio Astronomy. 1150-1155 - Yang Yang, Mustafa Cenk Gursoy, Marcelo M. Carvalho:
Throughput-Optimal RIS-Aided Uplink NOMA Transmissions with Downlink Simultaneous Wireless Information and Power Transfer. 1156-1161 - Anders Hansson, Arwid Komulainen, Ulf Sterner, Jimmi Grönkvist:
A Placement Method for Low-Flying UAVs in High Data Rate Tactical Networks. 1162-1167 - Joseph P. Macker, Kyle Lawson Crandall, Jeffery W. Weston:
Distributed Average Consensus and Connected Dominating Sets. 1168-1173 - Negar Erfaniantaghvayi, Zhongyuan Zhao, Kevin S. Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Ant Backpressure Routing for Wireless Multi-hop Networks with Mixed Traffic Patterns. 1174-1179 - Lorenzo Campioni, Edoardo Di Caro, Maggie R. Breedy, Jan Nilsson, Niranjan Suri:
A Network Connectivity Analysis of the Anglova Scenario. 1180-1185 - Anirudha Sahoo:
An Admission Control Algorithm for Isochronous and Asynchronous Traffic in IEEE 802.11ad MAC. 1186-1191 - I. Chen, Shukri Abdallah, Feng Xie, Venkatesh Ramaswamy:
Using 5G to Integrate Heterogeneous Networks with Improved Traffic Engineering. 1192-1197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
