default search action
37th MILCOM 2018: Los Angeles, CA, USA
- 2018 IEEE Military Communications Conference, MILCOM 2018, Los Angeles, CA, USA, October 29-31, 2018. IEEE 2018, ISBN 978-1-5386-7185-6
- Daoud Burghal, Rui Wang, Andreas F. Molisch:
Band Assignment in Dual Band Systems: A Learning-Based Approach. 7-13 - Garrett M. Vanhoy, Noah Thurston, Andrew Burger, Jacob Breckenridge, Tamal Bose:
Hierarchical Modulation Classification Using Deep Learning. 20-25 - Lauren J. Wong, William C. Headley, Seth Andrews, Ryan M. Gerdes, Alan J. Michaels:
Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification. 26-33 - Nirmit Desai, Raghu K. Ganti, Heesung Kwon, Ian J. Taylor, Mudhakar Srivatsa:
Unsupervised Estimation of Domain Applicability of Models. 34-39 - Benjamin D. Horne, William Dron, Sibel Adali:
Models for Predicting Community-Specific Interest in News Articles. 46-51 - Jing Ya, Tingwen Liu, Quangang Li, Pin Lv, Jinqiao Shi, Li Guo:
Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks. 58-63 - Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. 70-75 - Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Characterizing the Effectiveness of Network-Based Intrusion Detection Systems. 76-81 - Pankaz Das, Rezoan A. Shuvro, Mahshid Rahnamay-Naeini, Nasir Ghani, Majeed M. Hayat:
Efficient Interconnectivity Among Networks Under Security Constraint. 88-93 - Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese:
On Defensive Cyber Deception: A Case Study Using SDN. 110-115 - Niranjan Suri, Roberto Fronteddu, Eelco Cramer, Maggie R. Breedy, Kelvin Marcus, Ronald in 't Velt, Jan Nilsson, Mattia Mantovani, Lorenzo Campioni, Filippo Poltronieri, Giacomo Benincasa, Blake Ordway, Markus Peuhkuri, Mathias Rautenberg:
Experimental Evaluation of Group Communications Protocols for Tactical Data Dissemination. 133-139 - Tugba Erpek, Yalin E. Sagduyu, Yi Shi, Maice Costa, Kemal Davaslioglu, Hao Han, Daniel Fayette, Eric Johnson, Elizabeth S. Bentley, Clif Banner:
Routing, Network Coding and TCP Support for Wideband HF Communications. 157-162 - Jason R. Pennington, Richard K. Martin:
Utilization of Inter-Block Interference in MIMO-OFDM Communication Systems. 163-168 - Michael L. Don, Gonzalo R. Arce:
Antenna Radiation Pattern Compressive Sensing. 174-181 - Jeff Pugh, Mohamad Alkadamani, Colin Brown, Vivianne Jodalen:
Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain. 188-193 - Seun Sangodoyin, Usman T. Virk, Daoud Burghal, Katsuyuki Haneda, Andreas F. Molisch:
Joint Characterization of MM-Wave and CM-Wave Device-to-Device Fading Channels. 194-200 - Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, Narayan B. Mandayam:
How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks? 201-206 - Yue Xu, Jianyuan Yu, William C. Headley, R. Michael Buehrer:
Deep Reinforcement Learning for Dynamic Spectrum Access in Wireless Networks. 207-212 - Adam L. Anderson, Steven R. Young, Thomas P. Karnowski, Jason M. Vann:
Deepmod: An Over-the-Air Trainable Machine Modem for Resilient PHY Layer Communications. 213-218 - Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:
Capacity of Deliberate Side-Channels Created by Software Activities. 237-242 - Matthew Johnston, Claudiu Danilov, Kevin Larson:
A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical Networks. 267-272 - Joy Na Wang, Patricia Deutsch, Scott Moore, Bow-Nan Cheng:
Topology Algorithm Enhancements for Aerial High Capacity Directional Networks. 273-277 - Haochen Hu, Zhi Sun, Josep Miquel Jornet:
Through-the-Body Localization of Implanted Biochip in Wearable Nano-Biosensing Networks. 278-283 - David A. Heide, Aaron E. Cohen, Thomas M. Moran:
Signal Combination Techniques to Improve Long Range Communication with Multinle Relays. 284-289 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:
Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture Over AWGN Channel. 290-295 - Armando J. Vigil, Mike D. Rhoades:
Communications Performance Based Specification of Phase Noise for SATCOM Systems. 296-302 - Josh Wetherington, Glen Garner, Todd Nichols, Shaun Gidcumb, Eric Phillips, Michael Steer:
Nonlinear Co-Site Interference Measurement. 303-306 - Jonmei J. Yan, Donald E. Cowles, Donald F. Kimball, Anders Mattsson:
Multi-Carrier Envelope Tracking Power Amplifier. 313-316 - SaiDhiraj Amuru, R. Michael Buehrer:
On Jammer Power Allocation Against OFDM Signals in Fading Channels. 317-322 - Jonathan P. Beaudeau, Prabahan Basu, David Couto, William D. Watson:
Distortion Filtering for Communications Localization Denial. 323-328 - Bijan G. Mobasseri, Khanh D. Pham:
Chirp Spread Spectrum Performance in Low Probability of Intercept Theater. 329-335 - Litao Mao, Yongzhao Li, Tao Li, Mingjun Gao, Hailin Zhang:
Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability. 336-340 - Jasmin A. Mahal, T. Charles Clancy:
Analysis of Pilot-Spoofing Attack in MISO-OFDM System Over Correlated Fading Channel. 341-346 - Maroula Bratakos, Rohit Gupta, William Harbison:
Broadband IP Over SATCOM Networking for Rotary Wing Aircraft. 358-363 - Alex Bvrley, Adly T. Fam:
A Receiver for Multicarrier Logarithmic Warped Frequency Domain Code Waveforms. 376-381 - Jon J. Aho, Alexander W. Witt, Carter B. F. Casey, Nirav Trivedi, Venkatesh Ramaswamy:
Generating Realistic Data for Network Analytics. 401-406 - Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. 407-412 - Todd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami:
Towards the Development of Robust Deep Neural Networks in Adversarial Settings. 419-424 - Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami:
Enablers of Adversarial Attacks in Machine Learning. 425-430 - Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler:
On Detecting Manifestation of Adversary Characteristics. 431-437 - John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. 450-455 - Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. 456-461 - Xi Zhang, Qixuan Zhu:
Hierarchical-Caching Based Statistical QoS Provisioning Over 5G Multimedia Big-Data Mobile Wireless Networks. 480-485 - Howard McDonald, D. J. Shyy, Matt Steele, Cameron Patterson:
LTE Uplink Interference Mitigation Features. 505-511 - Venkatesh Ramaswamy, Jeffrey T. Correia:
Enhancing Service Availability of LTE-in-a-Box Systems Using 3GPP-Compliant Strategies. 512-517 - Hung-Yi Lo, James S. Lehnert, Phuong T. Tran:
Performance Analysis for MIMO HF Communications with Dominant Galactic Noise. 524-529 - Jinho Kang, Jung Hoon Lee, Wan Choi:
Dimension-optimized Two-Stage Precoder Design for Massive Mimo Systems with Limited Feedback. 530-535 - Robert Sellin, Frank Kragh:
A Noise-Masking Physical Layer Security Technique for MIMO Communications Systems. 536-540 - Kentaro Masukawa, Hideki Ochiai:
A Coded MIMO Spatial Multiplexing Approach with Low-Complexity Matched-Filter Detector and CRC-Assisted Interference Cancellation. 541-546 - Susmit Jha, Uyeong Jang, Somesh Jha, Brian Jalaian:
Detecting Adversarial Examples Using Data Manifolds. 547-552 - Kaichen Yang, Jianqing Liu, Chi Zhang, Yuguang Fang:
Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems. 559-564 - Yepeng Yao, Liya Su, Zhigang Lu:
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic. 579-584 - Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. 593-598 - Peter Menegay, Jason Salyers, Griffin College:
Secure Communications Using Blockchain Technology. 599-604 - Tianxiang Li, Wentao Shang, Alexander Afanasyev, Lan Wang, Lixia Zhang:
A Brief Introduction to NDN Dataset Synchronization (NDN Sync). 612-618 - Zhiyi Zhang, Yingdi Yu, Sanjeev Kaushik Ramani, Alexander Afanasyev, Lixia Zhang:
NAC: Automating Access Control via Named Data. 626-633 - Tamer Refaei, Alexander Afanasyev:
Enabling a Data-Centric Battlefield Through Information Access Gateways. 634-639 - Jeff Burke, Alexander Afanasyev, Tamer Refaei, Lixia Zhang:
NDN Impact on Tactical Application Development. 640-646 - Arjen Holtzer, Ronald in 't Velt, Floris Drijver, Henning Rogge, Jonathan Kirchhoff, Christoph Barz, Niels L. M. van Adrichem, Mariann Hauge:
Tactical Router Interoperability: Concepts and Experiments. 647-654 - Juha Järvinen, Aleksi Marttinen, Risto Järvinen, Per Carlén, Marko Luoma, Markus Peuhkuri, Jukka Manner:
Enabling XEP-0258 Security Labels in XMPP. 661-666 - Konrad S. Wrona, Michal Jarosz:
Does NATO Need a Blockchain? 667-672 - Alberto Domingo, Manisha Parmar:
Functional Analysis of Cyberspace Operations. 673-678 - Marc van Selm, Hermann Wietgrefe, Joel Varanda, Detlef Janezic:
DCIS Cube: Defining Architecture Building Blocks for Next Generation Deployable IT Systems. 679-684 - Ravi Kadlimatti, Adly T. Fam:
Efficient Multirate Filter Bank Structure with Full Spectral Utilization for Multicarrier Communications. 697-702 - Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny:
Experimental Comparison of FB-MC-SS and DS-SS in HF Channels. 714-719 - Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks. 731-736 - Stephen Russell, Tarek F. Abdelzaher:
The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-Making. 737-742 - Jongdeog Lee, Tarek F. Abdelzaher, Hang Qiu, Ramesh Govindan, Kelvin Marcus, Reginald L. Hobbs, Niranjan Suri, Will Dron:
On Tracking Realistic Targets in a Megacity with Contested Domain Access. 743-748 - Torkjel Søndrol, Brian Jalaian, Niranjan Suri:
Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective. 749-756 - Filippo Poltronieri, Laurel Sadler, Giacomo Benincasa, Timothy Gregory, John M. Harrell, Somiya Metu, Christine Moulton:
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment. 757-762 - Aaron E. Cohen, Gina G. Jiang, David A. Heide, Vincenzo Pellegrini, Niranjan Suri:
Radio Frequency IoT Sensors in Military Operations in a Smart City. 763-767 - Lloyd G. Greenwald, Kurt Rohloff, David Stott:
Secure Proxy-Reencryption-Based Inter-Network Key Exchange. 780-785 - Sima Azizi, Arash Komaee:
An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels. 786-791 - Xian Liu:
Secrecy Performance of a Relaying System Over Non-Identical Fading Channels. 792-797 - Yi Shi, Satya Prakash Ponnaluri, Yalin E. Sagduyu, Eric Van Doorn:
Distributed Coherent Group Communications. 798-803 - Dimitrios Sikeridis, Eirini-Eleni Tsiropoulou, Michael Devetsikiotis, Symeon Papavassiliou:
Socio-spatial Resource Management in Wireless Powered Public Safety Networks. 810-815 - Erlend Larsen, Lars Landmark, Øivind Kure:
The Effects of a UAV on a Terrestrial MANET. 816-821 - Thomas Schucker, Tamal Bose, Bo Ryu:
Emulating Wireless Networks with High Fidelity RF Interference Modeling. 822-828 - Stephan P. Winter, Matthias G. Schraml, Marcus T. Knopp, Andreas Knopp:
Spatial Modulation for Improved Eavesdropping Resistance in Multi-Beam Satellite Downlinks. 829-834 - Christian A. Hofmann, Andreas Knopp:
Satellite Downlink Jamming Propagation Measurements at Ku-Band. 853-858 - Yue Xu, Jianyuan Yu, R. Michael Buehrer:
Dealing with Partial Observations in Dynamic Spectrum Access: Deep Recurrent Q-Networks. 865-870 - Elliott Grafer, George Miles, Alex Cramer, Anthony Klee, Charles Middleton, Richard DeSalvo:
RF Photonic Equalization Using Stimulated Brillouin Scattering. 893-895 - Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. 907-913 - Enes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya:
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework. 926-932 - Mark Moulin, Emeka Eyisi, Devu Manikantan Shila, Qinqing Zhang:
Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic. 933-938 - Adriaan Larmuseau, Devu M. Shila:
PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches. 939-945 - Abdullah Aydeger, Nico Saputro, Kemal Akkaya:
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks. 946-951 - Mohsen Karimzadeh Kiskani, Hamid R. Sadjadpour:
Achieving Perfect Secrecy with One Bit Keys. 977-982 - Jun Liu:
A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable Security. 989-994 - Joakim Flathagen, Ole Ingar Bentstuen:
Control Plane Performance in Tactical Software Defined Networks. 1001-1006 - Jeffrey Wildman, Scott Moore, Leonid Veytser, Thomas Capuano, Jon Shapiro, Jason Hillger, Bow-Nan Cheng:
Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks. 1031-1036 - Roberto Fronteddu, Alessandro Morelli, Mattia Mantovani, Blake Ordway, Lorenzo Campioni, Niranjan Suri, Kelvin M. Marcus:
State Estimation for Tactical Networks: Challenges and Approaches. 1042-1048 - Yi Li, Wenhao Xiong, Nichole Sullivan, Genshe Chen, Biao Chen, Gregory Hadynski, Clifden Banner, Yiran Xu, Xin Tian:
Power Optimization for Energy Efficient Wireless Communications Using Hybrid-ARQ. 1062-1067 - Graham A. Bent, Geeth de Mel, Raghu K. Ganti, Tom La Porta, Gavin Pearson, Tien Pham, Sebastian Stein, Leandros Tassiulas, Ian J. Taylor:
Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research Directions. 1080-1085 - Cagri Goken, Guven Yenihayat, Tolga Numanoglu:
How to Introduce a Narrowband IoT Solution to an Existing Wireless Communications System. 1-6 - Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. 1-6 - Alexander Afanasyev, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, Lixia Zhang:
A Brief Introduction to Named Data Networking. 1-6 - Espen Skjervold, Oistein T. Hoelsreter:
Autonomous, Cooperative UAV Operations Using COTS Consumer Drones and Custom Ground Control Station. 1-6 - Romain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent:
Doubly-Selective Channel Estimation for Continuous Phase Modulation. 1-6 - Enass Hriba, Matthew C. Valenti:
The Impact of Correlated Blocking on Millimeter- Wave Personal Networks. 1-6 - Hosseinali Jamal, David W. Matolak:
PAPR Analysis for Dual-Polarization FBMC. 1-5 - Balachander Ramamurthy, Robert T. Schwarz, William G. Cowley, Gerald Bolding, Andreas Knopp:
Passive Channel Orthogonality Measurement Technique for MIMO SATCOM. 1-6 - Alptekin Yilmaz, Mustafa Kesal, Furuzan Atay Onat:
Frequency Estimation for Burst Communication Based on Irregular Repetition of Data Symbols. 1-9 - Filippo Poltronieri, Lorenzo Campioni, Rita Lenzi, Alessandro Morelli, Niranjan Suri, Mauro Tortonesi:
Secure Multi-Domain Information Sharing in Tactical Networks. 1-6 - Ismail Shakeel:
Machine Learning Based Featureless Signalling. 1-9 - Stephen Wolfe, Simon Begashaw, Yuqiao Liu, Kapil R. Dandekar:
Adaptive Link Optimization for 802.11 UAV Uplink Using a Reconfigurable Antenna. 1-6 - Scott Kuzdeba, Andrew Radlbeck, Matthew Anderson:
Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures. 1-9 - Kelvin Chew, Preetha Thulasiraman:
Secure Neighbor Discovery Using Symmetric Link Management in Tactical Sensor Networks. 1-6 - Jeffrey Wildman, Thomas Capuano, David Wiggins, Leonid Veytser, Omar Salama, Robert H. Spaanenburg, Jason Hillger, Bow-Nan Cheng:
Enhancing the Common-Modem Hardware Integrated Library (CHIL) Framework. 1-6 - Ahmed Ali-Eldin, Deepak Ganesan, Heesung Kwon, Benjamin M. Marlin, Prashant J. Shenoy, Mani B. Srivastava, Don Towsley:
Executing Analytics and Fusion Workloads on Transient Computing Resources in Tactical Environments. 1-9 - Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah:
SOTA: Secure Over-the-Air Programming of IoT Devices. 1-8 - William Dron, Andrew Hunter, Ali Sydney, Siddharth Pal, John P. Hancock, Lisa Scott, Tarek F. Abdelzaher, Jiawei Han, Sibel Adali, Benjamin D. Horne:
Multi-Domain Integration and Correlation Engine. 1-9 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm. 1-5 - Xiaoyun Wang, Chun-Ming Lai, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. 1-9 - Rajeev Gopal:
Resilient Sa