


default search action
37th MILCOM 2018: Los Angeles, CA, USA
- 2018 IEEE Military Communications Conference, MILCOM 2018, Los Angeles, CA, USA, October 29-31, 2018. IEEE 2018, ISBN 978-1-5386-7185-6
- Daoud Burghal, Rui Wang, Andreas F. Molisch:
Band Assignment in Dual Band Systems: A Learning-Based Approach. 7-13 - Garrett M. Vanhoy, Noah Thurston, Andrew Burger, Jacob Breckenridge, Tamal Bose:
Hierarchical Modulation Classification Using Deep Learning. 20-25 - Lauren J. Wong, William C. Headley, Seth Andrews, Ryan M. Gerdes, Alan J. Michaels:
Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification. 26-33 - Nirmit Desai, Raghu K. Ganti, Heesung Kwon, Ian J. Taylor, Mudhakar Srivatsa:
Unsupervised Estimation of Domain Applicability of Models. 34-39 - Benjamin D. Horne, William Dron, Sibel Adali:
Models for Predicting Community-Specific Interest in News Articles. 46-51 - Jing Ya
, Tingwen Liu, Quangang Li
, Pin Lv, Jinqiao Shi, Li Guo:
Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks. 58-63 - Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. 70-75 - Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Characterizing the Effectiveness of Network-Based Intrusion Detection Systems. 76-81 - Pankaz Das, Rezoan A. Shuvro, Mahshid Rahnamay-Naeini, Nasir Ghani, Majeed M. Hayat:
Efficient Interconnectivity Among Networks Under Security Constraint. 88-93 - Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese
:
On Defensive Cyber Deception: A Case Study Using SDN. 110-115 - Niranjan Suri, Roberto Fronteddu, Eelco Cramer, Maggie R. Breedy, Kelvin Marcus, Ronald in 't Velt, Jan Nilsson, Mattia Mantovani, Lorenzo Campioni, Filippo Poltronieri
, Giacomo Benincasa, Blake Ordway, Markus Peuhkuri, Mathias Rautenberg:
Experimental Evaluation of Group Communications Protocols for Tactical Data Dissemination. 133-139 - Tugba Erpek, Yalin E. Sagduyu, Yi Shi
, Maice Costa, Kemal Davaslioglu
, Hao Han, Daniel Fayette, Eric Johnson, Elizabeth S. Bentley, Clif Banner:
Routing, Network Coding and TCP Support for Wideband HF Communications. 157-162 - Jason R. Pennington, Richard K. Martin
:
Utilization of Inter-Block Interference in MIMO-OFDM Communication Systems. 163-168 - Michael L. Don
, Gonzalo R. Arce
:
Antenna Radiation Pattern Compressive Sensing. 174-181 - Jeff Pugh, Mohamad Alkadamani, Colin Brown, Vivianne Jodalen:
Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain. 188-193 - Seun Sangodoyin, Usman T. Virk, Daoud Burghal, Katsuyuki Haneda, Andreas F. Molisch:
Joint Characterization of MM-Wave and CM-Wave Device-to-Device Fading Channels. 194-200 - Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, Narayan B. Mandayam:
How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks? 201-206 - Yue Xu, Jianyuan Yu, William C. Headley, R. Michael Buehrer:
Deep Reinforcement Learning for Dynamic Spectrum Access in Wireless Networks. 207-212 - Adam L. Anderson, Steven R. Young, Thomas P. Karnowski
, Jason M. Vann
:
Deepmod: An Over-the-Air Trainable Machine Modem for Resilient PHY Layer Communications. 213-218 - Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:
Capacity of Deliberate Side-Channels Created by Software Activities. 237-242 - Matthew Johnston, Claudiu Danilov, Kevin Larson:
A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical Networks. 267-272 - Joy Na Wang, Patricia Deutsch, Scott Moore, Bow-Nan Cheng:
Topology Algorithm Enhancements for Aerial High Capacity Directional Networks. 273-277 - Haochen Hu, Zhi Sun, Josep Miquel Jornet
:
Through-the-Body Localization of Implanted Biochip in Wearable Nano-Biosensing Networks. 278-283 - David A. Heide, Aaron E. Cohen
, Thomas M. Moran:
Signal Combination Techniques to Improve Long Range Communication with Multinle Relays. 284-289 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:
Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture Over AWGN Channel. 290-295 - Armando J. Vigil, Mike D. Rhoades:
Communications Performance Based Specification of Phase Noise for SATCOM Systems. 296-302 - Josh Wetherington, Glen Garner, Todd Nichols, Shaun Gidcumb, Eric Phillips, Michael Steer:
Nonlinear Co-Site Interference Measurement. 303-306 - Jonmei J. Yan, Donald E. Cowles, Donald F. Kimball, Anders Mattsson:
Multi-Carrier Envelope Tracking Power Amplifier. 313-316 - SaiDhiraj Amuru, R. Michael Buehrer:
On Jammer Power Allocation Against OFDM Signals in Fading Channels. 317-322 - Jonathan P. Beaudeau, Prabahan Basu, David Couto, William D. Watson:
Distortion Filtering for Communications Localization Denial. 323-328 - Bijan G. Mobasseri, Khanh D. Pham:
Chirp Spread Spectrum Performance in Low Probability of Intercept Theater. 329-335 - Litao Mao, Yongzhao Li, Tao Li, Mingjun Gao, Hailin Zhang:
Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability. 336-340 - Jasmin A. Mahal, T. Charles Clancy:
Analysis of Pilot-Spoofing Attack in MISO-OFDM System Over Correlated Fading Channel. 341-346 - Maroula Bratakos, Rohit Gupta, William Harbison:
Broadband IP Over SATCOM Networking for Rotary Wing Aircraft. 358-363 - Alex Bvrley, Adly T. Fam:
A Receiver for Multicarrier Logarithmic Warped Frequency Domain Code Waveforms. 376-381 - Jon J. Aho, Alexander W. Witt, Carter B. F. Casey, Nirav Trivedi, Venkatesh Ramaswamy:
Generating Realistic Data for Network Analytics. 401-406 - Yi Shi
, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. 407-412 - Todd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami:
Towards the Development of Robust Deep Neural Networks in Adversarial Settings. 419-424 - Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami:
Enablers of Adversarial Attacks in Machine Learning. 425-430 - Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler:
On Detecting Manifestation of Adversary Characteristics. 431-437 - John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. 450-455 - Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. 456-461 - Xi Zhang, Qixuan Zhu:
Hierarchical-Caching Based Statistical QoS Provisioning Over 5G Multimedia Big-Data Mobile Wireless Networks. 480-485 - Howard McDonald, D. J. Shyy, Matt Steele, Cameron Patterson:
LTE Uplink Interference Mitigation Features. 505-511 - Venkatesh Ramaswamy, Jeffrey T. Correia:
Enhancing Service Availability of LTE-in-a-Box Systems Using 3GPP-Compliant Strategies. 512-517 - Hung-Yi Lo, James S. Lehnert, Phuong T. Tran:
Performance Analysis for MIMO HF Communications with Dominant Galactic Noise. 524-529 - Jinho Kang, Jung Hoon Lee, Wan Choi
:
Dimension-optimized Two-Stage Precoder Design for Massive Mimo Systems with Limited Feedback. 530-535 - Robert Sellin, Frank Kragh:
A Noise-Masking Physical Layer Security Technique for MIMO Communications Systems. 536-540 - Kentaro Masukawa, Hideki Ochiai:
A Coded MIMO Spatial Multiplexing Approach with Low-Complexity Matched-Filter Detector and CRC-Assisted Interference Cancellation. 541-546 - Susmit Jha, Uyeong Jang, Somesh Jha, Brian Jalaian:
Detecting Adversarial Examples Using Data Manifolds. 547-552 - Kaichen Yang, Jianqing Liu, Chi Zhang, Yuguang Fang
:
Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems. 559-564 - Yepeng Yao, Liya Su, Zhigang Lu:
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic. 579-584 - Deepak K. Tosh
, Sachin Shetty
, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. 593-598 - Peter Menegay, Jason Salyers, Griffin College:
Secure Communications Using Blockchain Technology. 599-604 - Tianxiang Li, Wentao Shang, Alexander Afanasyev
, Lan Wang, Lixia Zhang:
A Brief Introduction to NDN Dataset Synchronization (NDN Sync). 612-618 - Zhiyi Zhang
, Yingdi Yu, Sanjeev Kaushik Ramani, Alexander Afanasyev
, Lixia Zhang:
NAC: Automating Access Control via Named Data. 626-633 - Tamer Refaei, Alexander Afanasyev
:
Enabling a Data-Centric Battlefield Through Information Access Gateways. 634-639 - Jeff Burke, Alexander Afanasyev
, Tamer Refaei, Lixia Zhang:
NDN Impact on Tactical Application Development. 640-646 - Arjen Holtzer, Ronald in 't Velt, Floris Drijver, Henning Rogge, Jonathan Kirchhoff, Christoph Barz, Niels L. M. van Adrichem, Mariann Hauge:
Tactical Router Interoperability: Concepts and Experiments. 647-654 - Juha Järvinen
, Aleksi Marttinen, Risto Järvinen, Per Carlén, Marko Luoma, Markus Peuhkuri, Jukka Manner
:
Enabling XEP-0258 Security Labels in XMPP. 661-666 - Konrad S. Wrona
, Michal Jarosz
:
Does NATO Need a Blockchain? 667-672 - Alberto Domingo, Manisha Parmar:
Functional Analysis of Cyberspace Operations. 673-678 - Marc van Selm, Hermann Wietgrefe, Joel Varanda, Detlef Janezic:
DCIS Cube: Defining Architecture Building Blocks for Next Generation Deployable IT Systems. 679-684 - Ravi Kadlimatti, Adly T. Fam:
Efficient Multirate Filter Bank Structure with Full Spectral Utilization for Multicarrier Communications. 697-702 - Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny
:
Experimental Comparison of FB-MC-SS and DS-SS in HF Channels. 714-719 - Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks. 731-736 - Stephen Russell, Tarek F. Abdelzaher:
The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-Making. 737-742 - Jongdeog Lee, Tarek F. Abdelzaher, Hang Qiu, Ramesh Govindan, Kelvin Marcus, Reginald L. Hobbs, Niranjan Suri, Will Dron:
On Tracking Realistic Targets in a Megacity with Contested Domain Access. 743-748 - Torkjel Søndrol, Brian Jalaian, Niranjan Suri:
Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective. 749-756 - Filippo Poltronieri
, Laurel Sadler, Giacomo Benincasa, Timothy Gregory, John M. Harrell, Somiya Metu, Christine Moulton:
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment. 757-762 - Aaron E. Cohen
, Gina G. Jiang, David A. Heide, Vincenzo Pellegrini, Niranjan Suri:
Radio Frequency IoT Sensors in Military Operations in a Smart City. 763-767 - Lloyd G. Greenwald, Kurt Rohloff
, David Stott:
Secure Proxy-Reencryption-Based Inter-Network Key Exchange. 780-785 - Sima Azizi, Arash Komaee:
An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels. 786-791 - Xian Liu:
Secrecy Performance of a Relaying System Over Non-Identical Fading Channels. 792-797 - Yi Shi
, Satya Prakash Ponnaluri, Yalin E. Sagduyu, Eric Van Doorn:
Distributed Coherent Group Communications. 798-803 - Dimitrios Sikeridis
, Eirini-Eleni Tsiropoulou
, Michael Devetsikiotis, Symeon Papavassiliou:
Socio-spatial Resource Management in Wireless Powered Public Safety Networks. 810-815 - Erlend Larsen, Lars Landmark, Øivind Kure:
The Effects of a UAV on a Terrestrial MANET. 816-821 - Thomas Schucker, Tamal Bose, Bo Ryu
:
Emulating Wireless Networks with High Fidelity RF Interference Modeling. 822-828 - Stephan P. Winter, Matthias G. Schraml, Marcus T. Knopp
, Andreas Knopp:
Spatial Modulation for Improved Eavesdropping Resistance in Multi-Beam Satellite Downlinks. 829-834 - Christian A. Hofmann
, Andreas Knopp:
Satellite Downlink Jamming Propagation Measurements at Ku-Band. 853-858 - Yue Xu, Jianyuan Yu, R. Michael Buehrer:
Dealing with Partial Observations in Dynamic Spectrum Access: Deep Recurrent Q-Networks. 865-870 - Elliott Grafer, George Miles, Alex Cramer, Anthony Klee, Charles Middleton, Richard DeSalvo:
RF Photonic Equalization Using Stimulated Brillouin Scattering. 893-895 - Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. 907-913 - Enes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya:
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework. 926-932 - Mark Moulin, Emeka Eyisi, Devu Manikantan Shila, Qinqing Zhang:
Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic. 933-938 - Adriaan Larmuseau, Devu M. Shila:
PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches. 939-945 - Abdullah Aydeger, Nico Saputro
, Kemal Akkaya:
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks. 946-951 - Mohsen Karimzadeh Kiskani, Hamid R. Sadjadpour:
Achieving Perfect Secrecy with One Bit Keys. 977-982 - Jun Liu:
A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable Security. 989-994 - Joakim Flathagen, Ole Ingar Bentstuen:
Control Plane Performance in Tactical Software Defined Networks. 1001-1006 - Jeffrey Wildman, Scott Moore, Leonid Veytser, Thomas Capuano, Jon Shapiro, Jason Hillger, Bow-Nan Cheng:
Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks. 1031-1036 - Roberto Fronteddu, Alessandro Morelli
, Mattia Mantovani, Blake Ordway, Lorenzo Campioni, Niranjan Suri, Kelvin M. Marcus:
State Estimation for Tactical Networks: Challenges and Approaches. 1042-1048 - Yi Li, Wenhao Xiong, Nichole Sullivan, Genshe Chen, Biao Chen, Gregory Hadynski, Clifden Banner, Yiran Xu, Xin Tian:
Power Optimization for Energy Efficient Wireless Communications Using Hybrid-ARQ. 1062-1067 - Graham A. Bent, Geeth de Mel, Raghu K. Ganti, Tom La Porta, Gavin Pearson, Tien Pham, Sebastian Stein
, Leandros Tassiulas, Ian J. Taylor:
Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research Directions. 1080-1085 - Cagri Goken, Guven Yenihayat, Tolga Numanoglu:
How to Introduce a Narrowband IoT Solution to an Existing Wireless Communications System. 1-6 - Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. 1-6 - Alexander Afanasyev
, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, Lixia Zhang:
A Brief Introduction to Named Data Networking. 1-6 - Espen Skjervold, Oistein T. Hoelsreter:
Autonomous, Cooperative UAV Operations Using COTS Consumer Drones and Custom Ground Control Station. 1-6 - Romain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent:
Doubly-Selective Channel Estimation for Continuous Phase Modulation. 1-6 - Enass Hriba, Matthew C. Valenti:
The Impact of Correlated Blocking on Millimeter- Wave Personal Networks. 1-6 - Hosseinali Jamal, David W. Matolak:
PAPR Analysis for Dual-Polarization FBMC. 1-5 - Balachander Ramamurthy, Robert T. Schwarz, William G. Cowley
, Gerald Bolding, Andreas Knopp:
Passive Channel Orthogonality Measurement Technique for MIMO SATCOM. 1-6 - Alptekin Yilmaz, Mustafa Kesal, Furuzan Atay Onat:
Frequency Estimation for Burst Communication Based on Irregular Repetition of Data Symbols. 1-9 - Filippo Poltronieri
, Lorenzo Campioni, Rita Lenzi, Alessandro Morelli
, Niranjan Suri, Mauro Tortonesi
:
Secure Multi-Domain Information Sharing in Tactical Networks. 1-6 - Ismail Shakeel:
Machine Learning Based Featureless Signalling. 1-9 - Stephen Wolfe, Simon Begashaw, Yuqiao Liu, Kapil R. Dandekar
:
Adaptive Link Optimization for 802.11 UAV Uplink Using a Reconfigurable Antenna. 1-6 - Scott Kuzdeba, Andrew Radlbeck, Matthew Anderson:
Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures. 1-9 - Kelvin Chew, Preetha Thulasiraman:
Secure Neighbor Discovery Using Symmetric Link Management in Tactical Sensor Networks. 1-6 - Jeffrey Wildman, Thomas Capuano, David Wiggins, Leonid Veytser, Omar Salama, Robert H. Spaanenburg, Jason Hillger, Bow-Nan Cheng:
Enhancing the Common-Modem Hardware Integrated Library (CHIL) Framework. 1-6 - Ahmed Ali-Eldin, Deepak Ganesan, Heesung Kwon, Benjamin M. Marlin
, Prashant J. Shenoy
, Mani B. Srivastava
, Don Towsley
:
Executing Analytics and Fusion Workloads on Transient Computing Resources in Tactical Environments. 1-9 - Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah
:
SOTA: Secure Over-the-Air Programming of IoT Devices. 1-8 - William Dron, Andrew Hunter, Ali Sydney, Siddharth Pal, John P. Hancock, Lisa Scott, Tarek F. Abdelzaher, Jiawei Han, Sibel Adali, Benjamin D. Horne:
Multi-Domain Integration and Correlation Engine. 1-9 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm. 1-5 - Xiaoyun Wang, Chun-Ming Lai
, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. 1-9 - Rajeev Gopal:
Resilient Satellite Communications with Autonomous Multi-Modem Adapter. 1-6 - Siddhartha S. Borkotoky, Michael B. Pursley:
Fountain-Coded Multicast in Tactical Packet Radio Networks: Throughput Improvements Provided by Relay Nodes. 1-5 - Rakesh Datta, Sean Choi, Anurag Chowdhary, Younghee Park:
P4Guard: Designing P4 Based Firewall. 1-6 - Clement Kam, Joseph P. Molnar
, Sastry Kompella
:
Age of Information for Queues in Tandem. 1-6 - Clara Maathuis, Wolter Pieters, Jan van den Berg:
Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations. 1-6 - João Guerreiro
, Rui Dinis
, Paulo Montezuma, João Pedro Oliveira
, Mário Marques da Silva:
A Multi-branch Linear Amplification with Nonlinear Components Technique. 1-5 - Asmah Muallem, Sachin Shetty
, Liang Hong, Jan Wei Pan:
TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets. 1-6 - J. Aaron Pcnderarass, Sarah Helble, John Clemens
, Peter A. Loscocco:
A Platform Service for Remote Integrity Measurement and Attestation. 1-6 - Paul J. Nicholas, Karla L. Hoffman:
Analysis of Spectrum Allocation to Support Mobile Ad-Hoc Networks in Contested Environments. 1-6 - Ram Ramanathan, Christophe Servaes, Warren Ramanathan:
ECHO: Efficient Zero-Control Network-Wide Broadcast for Mobile Multi-Hop Wireless Networks. 1-6 - Jiangpan Hou, Peipei Fu, Zigang Cao, Anlin Xu:
Machine Learning Based DDos Detection Through NetFlow Analysis. 1-6 - Charles-Ugo Piat-Durozoi, Charly Poulliat, Nathalie Thomas, Marie-Laure Boucheret, Guy Lesthievent:
Precoding for Non-Coherent Detection of Continuous Phase Modulations. 1-5 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Array-Based Statistical Analysis of the MK-3 Authenticated Encryption Scheme. 1-9 - Iman Vakilinia
, Sui Cheung, Shamik Sengupta:
Sharing Susceptible Passwords as Cyber Threat Intelligence Feed. 1-6 - Nick Nordlund, Heesung Kwon, Geeth Ranmal De Mel, Leandros Tassiulas:
Image Classification on the Edge for Fast Multi-Camera Object Tracking. 1-5 - Qingyun Liu, Jack W. Stokes, Rob Mead, Tim Burrell, Ian Hellen, John Lambert, Andrey Marochko, Weidong Cui:
Latte: Large-Scale Lateral Movement Detection. 1-6 - Victor Valls, Heesung Kwon, Tom LaPorta, Sebastian Stein
, Leandros Tassiulas:
On the Design of Resource Allocation Algorithms for Low-Latency Video Analytics. 1-6 - Laura Poplawski Ma, Samuel Nelson, Gregory Lauer, Stephen Zabele:
ASAP: Preventing Starvation in Backpressure Forwarding. 1-9 - Muchen Wu, Charu C. Aggarwal, Zhou Yu, Ananthram Swami, Prasant Mohapatra:
Exploiting Knowledge Across Distinct Domains: Learning Event Details from Network Logs. 1-9 - Ayman I. Sabbah, Abdallah Jarwan
, Ismael Al-Shiab
, Mohamed Ibnkahla, Maoyu Wang:
Emulation of Large-Scale LTE Networks in NS-3 and CORE: A Distributed Approach. 1-6 - Anthony Ortiz, Olac Fuentes, Dalton S. Rosario, Christopher Kiekintveld:
On the Defense Against Adversarial Examples Beyond the Visible Spectrum. 1-5 - Michael V. Lipski, Ram M. Narayanan:
Applying Periodic Retraining to Survival Analysis-Based Dynamic Spectrum Access Algorithms. 1-6 - Serdar Sahin, Antonio Maria Cipriano, Charly Poulliat, Marie-Laure Boucheret:
On Cooperative Broadcast in MANETs with Imperfect Clock Synchronization. 1-7 - Kelvin Marcus, Kevin S. Chan, Rommie L. Hardy, Paul L. Yu:
An Environment for Tactical SDN Experimentation. 1-9 - David Kidston, Philip Hugg:
Impact of Header Compression on Tactical Networks. 1-6 - Jean Paul Dytioco Santos, Foad Fereidoony, Yikun Huang, Yuanxun Ethan Wang:
High Bandwidth Electrically Small Antennas Through BFSK Direct Antenna Modulation. 1-9 - Andreas Polydoros, Ioannis Dagres, Cenk Köse:
Cooperative Ad Hoc Node Localization with Ground-Level Suburban Measurements via Machine Learning Techniques. 1-9 - William D. Watson, David J. Couto, Jonathan P. Beaudeau:
Low Probability of Exploitation Waveform Design Using Barankin Bound Formulation. 1-6 - Muslum Ozgur Ozmen, Attila A. Yavuz
:
Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones. 1-6 - Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj:
Robust Neural Malware Detection Models for Emulation Sequence Learning. 1-8 - Frank T. Johnsen, Lars Landmark, Mariann Hauge, Erlend Larsen, Øivind Kure:
Publish/Subscribe Versus a Content-Based Approach for Information Dissemination. 1-9 - Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo
, Kunying Liu, Chao Liu, Min Yu, Prasant Mohapatra:
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails. 1-6 - Andreas Lang, Berthold Lankl:
Very Short Channel Codes for Burst-Type Transmissions. 1-9 - Taneli Riihonen, Dani Korpi
, Matias Turunen, Tatu Peltola, Joni Saikanmaki, Mikko Valkama
, Risto Wichman
:
Tactical Communication Link Under Joint Jamming and Interception by Same-Frequency Simultaneous Transmit and Receive Radio. 1-5 - Qiao Xiang, Franck Le, Yeon-Sup Lim, Vinod K. Mishra, Christopher Williams, Yang Richard Yang, Hongwei Zhang:
OpenSDC: A Novel, Generic Datapath for Software Defined Coalitions. 1-6 - Ulf Sterner, Sara Linder, Jan Nilsson, Karina M. Fors:
Inter-Network Interference in Synchronized Cooperative Broadcast Systems. 1-9 - Qiumao Ma, Wensheng Zhang:
Towards Practical Protection of Data Access Pattern to Cloud Storage. 1-9 - Ming Feng, Lijun Qian, Hao Xu:
Multi-Robot Enhanced MANET Intelligent Routing at Uncertain and Vulnerable Tactical Edge. 1-9 - Jim Luo, Qiuxiang Dong, Dijiang Huang
, Myong H. Kang:
Attribute Based Encryption for Information Sharing on Tactical Mobile Networks. 1-9 - Xiao Xu, Qing Zhao, Ananthram Swami:
Learning Ordinal Information Under Bipartite Stochastic Block Models. 1-9 - Richard M. Gutierrez, Arindam Dutta, Daniel W. Bliss:
Latency Analysis for Matched Filter Based Detection of Weak Signals. 1-6 - George M. Vachula, Mu-Cheng Wang, Mário D. Amico, Gurpartap S. Takhar, Steven Howard:
Synchronous Waveform Clock Synchronization Without a System Controller. 1-6 - Christophe J. Merlin, Laura Poplawski Ma, Gregory Lauer, Stephen Zabele:
Latency-Aware Forwarding for IRON: Latency Support for Back-Pressure Forwarding. 1-6 - Heikki Lantto, Juha Kukkola, Bernt Åkesson, Juha-Pekka Nikkarila, Mari Ristolainen:
Wargaming a Closed National Network. 1-6 - Stephen Andrew Laraway, Hussein Moradi, Behrouz Farhang-Boroujeny
:
RAKE Receiver for HF Filter Bank Multicarrier Spread Spectrum Systems. 1-6 - I. Zakir Ahmed, Hamid R. Sadjadpour, Shahram Yousefi:
Capacity Analysis and Bit Allocation Design for Variable-Resolution ADCs in Massive MIMO. 1-6 - Liang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, Fenghua Li:
Resolving Access Conflicts: An Auction-Based Incentive Approach. 1-6 - Michael Walter, Dmitriy Shutin, Armin Dammann
, David W. Matolak:
Modeling of Highly Non-Stationary Low Altitude Aircraft-to-Aircraft Channels. 1-5 - Gérôme Bovet, Kevin S. Chan:
Reinforcement Learning for Quality of Experience Optimization in Tactical Networks. 1-6 - Hossein Jafari, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, Lijun Qian:
IoT Devices Fingerprinting Using Deep Learning. 1-9 - J. J. Garcia-Luna-Aceves, James Mathewson, Ram Ramanathan, Bishal Thapa:
Loop-Free Integrated Forwarding and Routing with Gradients. 1-9 - Liming Li, Yang Wang, Liqin Ding:
Time Synchronization Sequence with Weighted Conjugate Symmetry Property for FBMC-OQAM Systems. 1-6 - Siddhartha, Yee Hui Lee, Duncan J. M. Moss, Julian Faraone
, Perry Blackmore, Daniel Salmond, David Boland
, Philip H. W. Leong
:
Long Short-Term Memory for Radio Frequency Spectral Prediction and its Real-Time FPGA Implementation. 1-9 - Taylor Sibbett, Hussein Moradi, Behrouz Farhang-Boroujeny
:
Normalized Matched Filter for Blind Interference Suppression. 1-6 - Alun D. Preece, Dan Harborne, Ramya Raghavendra, Richard Tomsett, Dave Braines
:
Provisioning Robust and Interpretable AI/ML-Based Service Bundles. 1-9 - Xiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh, Kok Ann Donny Teo, Zilong Liu
:
On the Performance of Single-Channel Source Separation of Two Co-Frequency PSK Signals with Carrier Frequency Offsets. 1-5 - Qi Zhao, Pengyuan Du, Mario Gerla, Adam J. Brown, Jae H. Kim:
Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks. 1-9 - Kshiteesh Hegde
, Malik Magdon-Ismail:
Separating Terrorist-Like Topological Signatures Embedded in Benign Networks. 1-9 - Jack W. Stokes, De Wang, Mady Marinescu, Marc Marino, Brian Bussone:
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models. 1-8 - Enahoro Oriero, Mohammad Ashiqur Rahman
:
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks. 1-9 - David B. Haab, Hussein Moradi, Behrouz Farhang-Boroujeny:
Filter Bank Multi-Carrier Spread Spectrum with Biorthogonal Signaling for High Speed Data Transmission Through HF Skywave Channels. 1-9 - Ryan Murphy, Ben Barnett, Landon Wagner, Jeffrey Wildman, Leonid Veytser, David Wiggins, Scott Buscemi, Tim Arganbright, Steve Clark, Bow-Nan Cheng:
CHIL: Common-Modem Hardware Integrated Library. 1-6 - John Clemens
, Raj Pal, Branden Sherrell:
Runtime State Verification on Resource-Constrained Platforms. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.