


Остановите войну!
for scientists:


default search action
37th MILCOM 2018: Los Angeles, CA, USA
- 2018 IEEE Military Communications Conference, MILCOM 2018, Los Angeles, CA, USA, October 29-31, 2018. IEEE 2018, ISBN 978-1-5386-7185-6
- Daoud Burghal, Rui Wang, Andreas F. Molisch:
Band Assignment in Dual Band Systems: A Learning-Based Approach. 7-13 - Garrett M. Vanhoy, Noah Thurston, Andrew Burger, Jacob Breckenridge, Tamal Bose:
Hierarchical Modulation Classification Using Deep Learning. 20-25 - Lauren J. Wong, William C. Headley, Seth Andrews, Ryan M. Gerdes, Alan J. Michaels:
Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification. 26-33 - Nirmit Desai, Raghu K. Ganti, Heesung Kwon, Ian J. Taylor, Mudhakar Srivatsa:
Unsupervised Estimation of Domain Applicability of Models. 34-39 - Benjamin D. Horne, William Dron, Sibel Adali:
Models for Predicting Community-Specific Interest in News Articles. 46-51 - Jing Ya, Tingwen Liu, Quangang Li
, Pin Lv, Jinqiao Shi, Li Guo:
Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks. 58-63 - Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. 70-75 - Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Characterizing the Effectiveness of Network-Based Intrusion Detection Systems. 76-81 - Pankaz Das, Rezoan A. Shuvro, Mahshid Rahnamay-Naeini, Nasir Ghani, Majeed M. Hayat:
Efficient Interconnectivity Among Networks Under Security Constraint. 88-93 - Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese
:
On Defensive Cyber Deception: A Case Study Using SDN. 110-115 - Niranjan Suri, Roberto Fronteddu, Eelco Cramer, Maggie R. Breedy, Kelvin Marcus, Ronald in 't Velt, Jan Nilsson, Mattia Mantovani, Lorenzo Campioni, Filippo Poltronieri
, Giacomo Benincasa, Blake Ordway, Markus Peuhkuri, Mathias Rautenberg:
Experimental Evaluation of Group Communications Protocols for Tactical Data Dissemination. 133-139 - Tugba Erpek, Yalin E. Sagduyu, Yi Shi, Maice Costa, Kemal Davaslioglu, Hao Han, Daniel Fayette, Eric Johnson, Elizabeth S. Bentley, Clif Banner:
Routing, Network Coding and TCP Support for Wideband HF Communications. 157-162 - Jason R. Pennington, Richard K. Martin:
Utilization of Inter-Block Interference in MIMO-OFDM Communication Systems. 163-168 - Michael L. Don
, Gonzalo R. Arce
:
Antenna Radiation Pattern Compressive Sensing. 174-181 - Jeff Pugh, Mohamad Alkadamani, Colin Brown, Vivianne Jodalen:
Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain. 188-193 - Seun Sangodoyin, Usman T. Virk, Daoud Burghal, Katsuyuki Haneda, Andreas F. Molisch:
Joint Characterization of MM-Wave and CM-Wave Device-to-Device Fading Channels. 194-200 - Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, Narayan B. Mandayam:
How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks? 201-206 - Yue Xu, Jianyuan Yu, William C. Headley, R. Michael Buehrer:
Deep Reinforcement Learning for Dynamic Spectrum Access in Wireless Networks. 207-212 - Adam L. Anderson, Steven R. Young, Thomas P. Karnowski
, Jason M. Vann
:
Deepmod: An Over-the-Air Trainable Machine Modem for Resilient PHY Layer Communications. 213-218 - Baki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic:
Capacity of Deliberate Side-Channels Created by Software Activities. 237-242 - Matthew Johnston, Claudiu Danilov, Kevin Larson:
A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical Networks. 267-272 - Joy Na Wang, Patricia Deutsch, Scott Moore, Bow-Nan Cheng:
Topology Algorithm Enhancements for Aerial High Capacity Directional Networks. 273-277 - Haochen Hu, Zhi Sun, Josep Miquel Jornet
:
Through-the-Body Localization of Implanted Biochip in Wearable Nano-Biosensing Networks. 278-283 - David A. Heide, Aaron E. Cohen
, Thomas M. Moran:
Signal Combination Techniques to Improve Long Range Communication with Multinle Relays. 284-289 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:
Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture Over AWGN Channel. 290-295 - Armando J. Vigil, Mike D. Rhoades:
Communications Performance Based Specification of Phase Noise for SATCOM Systems. 296-302 - Josh Wetherington, Glen Garner, Todd Nichols, Shaun Gidcumb, Eric Phillips, Michael Steer:
Nonlinear Co-Site Interference Measurement. 303-306 - Jonmei J. Yan, Donald E. Cowles, Donald F. Kimball, Anders Mattsson:
Multi-Carrier Envelope Tracking Power Amplifier. 313-316 - SaiDhiraj Amuru, R. Michael Buehrer:
On Jammer Power Allocation Against OFDM Signals in Fading Channels. 317-322 - Jonathan P. Beaudeau, Prabahan Basu, David Couto, William D. Watson:
Distortion Filtering for Communications Localization Denial. 323-328 - Bijan G. Mobasseri, Khanh D. Pham:
Chirp Spread Spectrum Performance in Low Probability of Intercept Theater. 329-335 - Litao Mao, Yongzhao Li, Tao Li, Mingjun Gao, Hailin Zhang:
Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability. 336-340 - Jasmin A. Mahal, T. Charles Clancy:
Analysis of Pilot-Spoofing Attack in MISO-OFDM System Over Correlated Fading Channel. 341-346 - Maroula Bratakos, Rohit Gupta, William Harbison:
Broadband IP Over SATCOM Networking for Rotary Wing Aircraft. 358-363 - Alex Bvrley, Adly T. Fam:
A Receiver for Multicarrier Logarithmic Warped Frequency Domain Code Waveforms. 376-381 - Jon J. Aho, Alexander W. Witt, Carter B. F. Casey, Nirav Trivedi, Venkatesh Ramaswamy:
Generating Realistic Data for Network Analytics. 401-406 - Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. 407-412 - Todd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami:
Towards the Development of Robust Deep Neural Networks in Adversarial Settings. 419-424 - Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami:
Enablers of Adversarial Attacks in Machine Learning. 425-430 - Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler:
On Detecting Manifestation of Adversary Characteristics. 431-437 - John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. 450-455 - Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. 456-461 - Xi Zhang, Qixuan Zhu:
Hierarchical-Caching Based Statistical QoS Provisioning Over 5G Multimedia Big-Data Mobile Wireless Networks. 480-485 - Howard McDonald, D. J. Shyy, Matt Steele, Cameron Patterson:
LTE Uplink Interference Mitigation Features. 505-511 - Venkatesh Ramaswamy, Jeffrey T. Correia:
Enhancing Service Availability of LTE-in-a-Box Systems Using 3GPP-Compliant Strategies. 512-517 - Hung-Yi Lo, James S. Lehnert, Phuong T. Tran:
Performance Analysis for MIMO HF Communications with Dominant Galactic Noise. 524-529 - Jinho Kang, Jung Hoon Lee, Wan Choi
:
Dimension-optimized Two-Stage Precoder Design for Massive Mimo Systems with Limited Feedback. 530-535 - Robert Sellin, Frank Kragh:
A Noise-Masking Physical Layer Security Technique for MIMO Communications Systems. 536-540 - Kentaro Masukawa, Hideki Ochiai:
A Coded MIMO Spatial Multiplexing Approach with Low-Complexity Matched-Filter Detector and CRC-Assisted Interference Cancellation. 541-546 - Susmit Jha, Uyeong Jang, Somesh Jha, Brian Jalaian:
Detecting Adversarial Examples Using Data Manifolds. 547-552 - Kaichen Yang, Jianqing Liu, Chi Zhang, Yuguang Fang
:
Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems. 559-564 - Yepeng Yao, Liya Su, Zhigang Lu:
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic. 579-584 - Deepak K. Tosh
, Sachin Shetty
, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. 593-598 - Peter Menegay, Jason Salyers, Griffin College:
Secure Communications Using Blockchain Technology. 599-604 - Tianxiang Li, Wentao Shang, Alexander Afanasyev
, Lan Wang, Lixia Zhang:
A Brief Introduction to NDN Dataset Synchronization (NDN Sync). 612-618 - Zhiyi Zhang, Yingdi Yu, Sanjeev Kaushik Ramani, Alexander Afanasyev
, Lixia Zhang:
NAC: Automating Access Control via Named Data. 626-633 - Tamer Refaei, Alexander Afanasyev
:
Enabling a Data-Centric Battlefield Through Information Access Gateways. 634-639 - Jeff Burke, Alexander Afanasyev
, Tamer Refaei, Lixia Zhang:
NDN Impact on Tactical Application Development. 640-646 - Arjen Holtzer, Ronald In't Velt, Floris Drijver, Henning Rogge, Jonathan Kirchhoff, Christoph Barz, Niels L. M. van Adrichem, Mariann Hauge:
Tactical Router Interoperability: Concepts and Experiments. 647-654 - Juha Järvinen
, Aleksi Marttinen, Risto Järvinen, Per Carlén, Marko Luoma, Markus Peuhkuri, Jukka Manner
:
Enabling XEP-0258 Security Labels in XMPP. 661-666 - Konrad S. Wrona
, Michal Jarosz
:
Does NATO Need a Blockchain? 667-672 - Alberto Domingo, Manisha Parmar:
Functional Analysis of Cyberspace Operations. 673-678 - Marc van Selm, Hermann Wietgrefe, Joel Varanda, Detlef Janezic:
DCIS Cube: Defining Architecture Building Blocks for Next Generation Deployable IT Systems. 679-684 - Ravi Kadlimatti, Adly T. Fam:
Efficient Multirate Filter Bank Structure with Full Spectral Utilization for Multicarrier Communications. 697-702 - Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny:
Experimental Comparison of FB-MC-SS and DS-SS in HF Channels. 714-719 - Xujiang Zhao, Feng Chen, Jin-Hee Cho:
Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks. 731-736 - Stephen Russell, Tarek F. Abdelzaher:
The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-Making. 737-742 - Jongdeog Lee, Tarek F. Abdelzaher, Hang Qiu, Ramesh Govindan, Kelvin Marcus, Reginald L. Hobbs, Niranjan Suri, Will Dron:
On Tracking Realistic Targets in a Megacity with Contested Domain Access. 743-748 - Torkjel Søndrol, Brian Jalaian, Niranjan Suri:
Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective. 749-756 - Filippo Poltronieri
, Laurel Sadler, Giacomo Benincasa, Timothy Gregory, John M. Harrell, Somiya Metu, Christine Moulton:
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment. 757-762 - Aaron E. Cohen
, Gina G. Jiang, David A. Heide, Vincenzo Pellegrini, Niranjan Suri:
Radio Frequency IoT Sensors in Military Operations in a Smart City. 763-767 - Lloyd G. Greenwald, Kurt Rohloff
, David Stott:
Secure Proxy-Reencryption-Based Inter-Network Key Exchange. 780-785 - Sima Azizi, Arash Komaee:
An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels. 786-791 - Xian Liu:
Secrecy Performance of a Relaying System Over Non-Identical Fading Channels. 792-797 - Yi Shi, Satya Prakash Ponnaluri, Yalin E. Sagduyu, Eric Van Doorn:
Distributed Coherent Group Communications. 798-803 - Dimitrios Sikeridis
, Eirini-Eleni Tsiropoulou
, Michael Devetsikiotis, Symeon Papavassiliou:
Socio-spatial Resource Management in Wireless Powered Public Safety Networks. 810-815 - Erlend Larsen, Lars Landmark, Øivind Kure:
The Effects of a UAV on a Terrestrial MANET. 816-821 - Thomas Schucker, Tamal Bose, Bo Ryu
:
Emulating Wireless Networks with High Fidelity RF Interference Modeling. 822-828 - Stephan P. Winter, Matthias G. Schraml, Marcus T. Knopp, Andreas Knopp:
Spatial Modulation for Improved Eavesdropping Resistance in Multi-Beam Satellite Downlinks. 829-834 - Christian A. Hofmann
, Andreas Knopp:
Satellite Downlink Jamming Propagation Measurements at Ku-Band. 853-858 - Yue Xu, Jianyuan Yu, R. Michael Buehrer:
Dealing with Partial Observations in Dynamic Spectrum Access: Deep Recurrent Q-Networks. 865-870 - Elliott Grafer, George Miles, Alex Cramer, Anthony Klee, Charles Middleton, Richard DeSalvo:
RF Photonic Equalization Using Stimulated Brillouin Scattering. 893-895 - Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. 907-913 - Enes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya:
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework. 926-932 - Mark Moulin, Emeka Eyisi, Devu Manikantan Shila, Qinqing Zhang:
Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic. 933-938 - Adriaan Larmuseau, Devu M. Shila:
PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches. 939-945 - Abdullah Aydeger, Nico Saputro
, Kemal Akkaya:
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks. 946-951 - Mohsen Karimzadeh Kiskani, Hamid R. Sadjadpour:
Achieving Perfect Secrecy with One Bit Keys. 977-982 - Jun Liu:
A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable Security. 989-994 - Joakim Flathagen, Ole Ingar Bentstuen:
Control Plane Performance in Tactical Software Defined Networks. 1001-1006 - Jeffrey Wildman, Scott Moore, Leonid Veytser, Thomas Capuano, Jon Shapiro, Jason Hillger, Bow-Nan Cheng:
Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks. 1031-1036 - Roberto Fronteddu, Alessandro Morelli, Mattia Mantovani, Blake Ordway, Lorenzo Campioni, Niranjan Suri, Kelvin M. Marcus:
State Estimation for Tactical Networks: Challenges and Approaches. 1042-1048 - Yi Li, Wenhao Xiong, Nichole Sullivan, Genshe Chen, Biao Chen, Gregory Hadynski, Clifden Banner, Yiran Xu, Xin Tian:
Power Optimization for Energy Efficient Wireless Communications Using Hybrid-ARQ. 1062-1067 - Graham A. Bent, Geeth de Mel, Raghu K. Ganti, Tom La Porta, Gavin Pearson, Tien Pham, Sebastian Stein
, Leandros Tassiulas, Ian J. Taylor:
Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research Directions. 1080-1085 - Cagri Goken, Guven Yenihayat, Tolga Numanoglu:
How to Introduce a Narrowband IoT Solution to an Existing Wireless Communications System. 1-6 - Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. 1-6 - Alexander Afanasyev
, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, Lixia Zhang:
A Brief Introduction to Named Data Networking. 1-6 - Espen Skjervold, Oistein T. Hoelsreter:
Autonomous, Cooperative UAV Operations Using COTS Consumer Drones and Custom Ground Control Station. 1-6 - Romain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent:
Doubly-Selective Channel Estimation for Continuous Phase Modulation. 1-6 - Enass Hriba, Matthew C. Valenti:
The Impact of Correlated Blocking on Millimeter- Wave Personal Networks. 1-6 - Hosseinali Jamal, David W. Matolak:
PAPR Analysis for Dual-Polarization FBMC. 1-5 - Balachander Ramamurthy, Robert T. Schwarz, William G. Cowley
, Gerald Bolding, Andreas Knopp:
Passive Channel Orthogonality Measurement Technique for MIMO SATCOM. 1-6 - Alptekin Yilmaz, Mustafa Kesal, Furuzan Atay Onat:
Frequency Estimation for Burst Communication Based on Irregular Repetition of Data Symbols. 1-9 - Filippo Poltronieri
, Lorenzo Campioni, Rita Lenzi, Alessandro Morelli
, Niranjan Suri, Mauro Tortonesi:
Secure Multi-Domain Information Sharing in Tactical Networks. 1-6 - Ismail Shakeel:
Machine Learning Based Featureless Signalling. 1-9 - Stephen Wolfe, Simon Begashaw, Yuqiao Liu, Kapil R. Dandekar
:
Adaptive Link Optimization for 802.11 UAV Uplink Using a Reconfigurable Antenna. 1-6 - Scott Kuzdeba, Andrew Radlbeck, Matthew Anderson:
Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures. 1-9 - Kelvin Chew, Preetha Thulasiraman:
Secure Neighbor Discovery Using Symmetric Link Management in Tactical Sensor Networks. 1-6 - Jeffrey Wildman, Thomas Capuano, David Wiggins, Leonid Veytser, Omar Salama, Robert H. Spaanenburg, Jason Hillger, Bow-Nan Cheng:
Enhancing the Common-Modem Hardware Integrated Library (CHIL) Framework. 1-6 - Ahmed Ali-Eldin, Deepak Ganesan, Heesung Kwon, Benjamin M. Marlin, Prashant J. Shenoy
, Mani B. Srivastava
, Don Towsley:
Executing Analytics and Fusion Workloads on Transient Computing Resources in Tactical Environments. 1-9 - Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah
:
SOTA: Secure Over-the-Air Programming of IoT Devices. 1-8 - William Dron, Andrew Hunter, Ali Sydney, Siddharth Pal, John P. Hancock, Lisa Scott, Tarek F. Abdelzaher, Jiawei Han, Sibel Adali, Benjamin D. Horne:
Multi-Domain Integration and Correlation Engine. 1-9 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm. 1-5 - Xiaoyun Wang, Chun-Ming Lai
, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. 1-9 - Rajeev Gopal:
Resilient Satellite Communications with Autonomous Multi-Modem Adapter. 1-6 - Siddhartha S. Borkotoky, Michael B. Pursley:
Fountain-Coded Multicast in Tactical Packet Radio Networks: Throughput Improvements Provided by Relay Nodes. 1-5