Alert button
Picture for William C. Headley

William C. Headley

Alert button

Virginia Tech

RFRL Gym: A Reinforcement Learning Testbed for Cognitive Radio Applications

Add code
Bookmark button
Alert button
Dec 20, 2023
Daniel Rosen, Illa Rochez, Caleb McIrvin, Joshua Lee, Kevin D'Alessandro, Max Wiecek, Nhan Hoang, Ramzy Saffarini, Sam Philips, Vanessa Jones, Will Ivey, Zavier Harris-Smart, Zavion Harris-Smart, Zayden Chin, Amos Johnson, Alyse M. Jones, William C. Headley

Viaarxiv icon

Probability-Reduction of Geolocation using Reconfigurable Intelligent Surface Reflections

Add code
Bookmark button
Alert button
Oct 18, 2022
Anders M. Buvarp, Daniel J. Jakubisin, William C. Headley, Jeffrey H. Reed

Figure 1 for Probability-Reduction of Geolocation using Reconfigurable Intelligent Surface Reflections
Figure 2 for Probability-Reduction of Geolocation using Reconfigurable Intelligent Surface Reflections
Figure 3 for Probability-Reduction of Geolocation using Reconfigurable Intelligent Surface Reflections
Figure 4 for Probability-Reduction of Geolocation using Reconfigurable Intelligent Surface Reflections
Viaarxiv icon

Scaled-Time-Attention Robust Edge Network

Add code
Bookmark button
Alert button
Jul 09, 2021
Richard Lau, Lihan Yao, Todd Huster, William Johnson, Stephen Arleth, Justin Wong, Devin Ridge, Michael Fletcher, William C. Headley

Figure 1 for Scaled-Time-Attention Robust Edge Network
Figure 2 for Scaled-Time-Attention Robust Edge Network
Figure 3 for Scaled-Time-Attention Robust Edge Network
Figure 4 for Scaled-Time-Attention Robust Edge Network
Viaarxiv icon

Training Data Augmentation for Deep Learning RF Systems

Add code
Bookmark button
Alert button
Oct 19, 2020
William H. Clark IV, Steven Hauser, William C. Headley, Alan J. Michaels

Figure 1 for Training Data Augmentation for Deep Learning RF Systems
Figure 2 for Training Data Augmentation for Deep Learning RF Systems
Figure 3 for Training Data Augmentation for Deep Learning RF Systems
Figure 4 for Training Data Augmentation for Deep Learning RF Systems
Viaarxiv icon

Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks

Add code
Bookmark button
Alert button
May 27, 2020
Matthew DelVecchio, Vanessa Arndorfer, William C. Headley

Figure 1 for Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks
Figure 2 for Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks
Figure 3 for Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks
Figure 4 for Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks
Viaarxiv icon

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Add code
Bookmark button
Alert button
May 27, 2020
Matthew DelVecchio, Bryse Flowers, William C. Headley

Figure 1 for Effects of Forward Error Correction on Communications Aware Evasion Attacks
Figure 2 for Effects of Forward Error Correction on Communications Aware Evasion Attacks
Figure 3 for Effects of Forward Error Correction on Communications Aware Evasion Attacks
Figure 4 for Effects of Forward Error Correction on Communications Aware Evasion Attacks
Viaarxiv icon

Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments

Add code
Bookmark button
Alert button
Sep 25, 2019
Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu, William C. Headley, Michael Fowler, Gilbert Green

Figure 1 for Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Figure 2 for Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Figure 3 for Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Figure 4 for Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Viaarxiv icon

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Add code
Bookmark button
Alert button
Mar 01, 2019
Bryse Flowers, R. Michael Buehrer, William C. Headley

Figure 1 for Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Figure 2 for Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Figure 3 for Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Figure 4 for Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Viaarxiv icon