default search action
Ahmed Refaey
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Hela Chamkhia, Aiman Erbad, Amr Mohamed, Ahmed Refaey Hussein, Abdulla Khalid Al-Ali, Mohsen Guizani:
Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System. IEEE Internet Things J. 11(2): 2027-2042 (2024) - [j31]Zeyad Abdelhay, Yahuza Bello, Ahmed Refaey:
Toward Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism. IEEE Wirel. Commun. 31(2): 74-80 (2024) - [c42]Mostafa Deiab, Vijayant Mehra, Hassan Shami, Yahuza Bello, Ahmed Refaey:
On Edge Level: The Impact of Adopting Deep Learning Techniques on Server Design. CCECE 2024: 139-140 - [c41]Murtadha Nisyif, Ahmed Refaey, Sylvester Aboagye:
Boosting Edge-to-Cloud Data Transmission Efficiency with Semantic Transcoding. CCECE 2024: 730-734 - [c40]Ibrahim Tamim, Abdallah Shami, Ahmed Refaey:
Security and High-Availability While Upholding Network Defense Patterns: The Advantages of A2C in O-RAN VNF Placement. ICC 2024: 1072-1077 - [c39]Emanuel Figetakis, Yahuza Bello, Ahmed Refaey, Abdallah Shami:
Decentralized Semantic Traffic Control in AVs Using RL and DQN for Dynamic Roadblocks. ICC 2024: 5449-5454 - [c38]Zeyad Abdelhay, Ahmed Refaey:
xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning Environment. IWCMC 2024: 1820-1825 - [i11]Robinson Paniagua, Radwa Sultan, Ahmed Refaey:
Unified Pandemic Tracking System Based on Open Geospatial Consortium SensorThings API. CoRR abs/2401.10898 (2024) - [i10]Emanuel Figetakis, Yahuza Bello, Ahmed Refaey, Abdallah Shami:
Decentralized Semantic Traffic Control in AVs Using RL and DQN for Dynamic Roadblocks. CoRR abs/2406.18741 (2024) - [i9]Zain Khaliq, Ahmed Refaey Hussein:
Raft Distributed System for Multi-access Edge Computing Sharing Resources. CoRR abs/2412.16774 (2024) - 2023
- [j30]Emna Baccour, Mhd Saria Allahham, Aiman Erbad, Amr Mohamed, Ahmed Refaey Hussein, Mounir Hamdi:
Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks. IEEE Commun. Mag. 61(2): 110-116 (2023) - [j29]Emanuel Figetakis, Ahmed Refaey Hussein, Mehmet Ulema:
Evolved Prevention Strategies for 6G Networks Through Stochastic Games and Reinforcement Learning. IEEE Netw. Lett. 5(3): 164-168 (2023) - [j28]Sara Zimmo, Abdallah Moubayed, Ahmed Refaey Hussein, Abdallah Shami:
Quality of service-aware coexistence in unlicensed 5G new radio based on time-domain virtualization. Int. J. Commun. Syst. 36(4) (2023) - [j27]Paul Mirdita, Yahuza Bello, Ahmed Refaey, Ayman Radwan:
6G-Enabled Mobile Access Point Placement via Dynamic Federated Learning Strategies. IEEE Open J. Commun. Soc. 4: 2093-2103 (2023) - [j26]M. G. S. Sriyananda, Xianbin Wang, Ahmed Refaey Hussein:
Learning-Based Neighboring Station Coverage Identification and Dynamic Resource Utilization for 3-D Cells in NR-U Networks. IEEE Syst. J. 17(4): 5999-6010 (2023) - [c37]Emanuel Figetakis, Yahuza Bello, Ahmed Refaey, Lei Lei, Medhat Moussa:
Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques. GLOBECOM 2023: 1042-1047 - [c36]Emanuel Figetakis, Ahmed Refaey:
Autonomous MEC Selection in Federated Next-Gen Networks via Deep Reinforcement Learning. GLOBECOM 2023: 2045-2050 - [c35]Yahuza Bello, Ahmed Refaey, Abdallah Shami:
Secure Migration in NGN: An Optimal Stopping Problem Approach with Partial Observability. GLOBECOM 2023: 2680-2685 - [c34]Yahuza Bello, Ahmed Refaey, Petros Spachos:
Optimized Provisioning Techniques for Geo-Distributed SDP-Enabled Next Generation Networks Security. ICC 2023: 296-302 - [c33]Eyad Shtaiwi, Ahmed Refaey Hussein, Awais Khawar, Ahmed Alkhateeb, Ahmed Abdelhadi, Zhu Han:
Implementation of Real-Time Adversarial Attacks on DNN-based Modulation Classifier. ICNC 2023: 288-292 - [i8]Emna Baccour, Mhd Saria Allahham, Aiman Erbad, Amr Mohamed, Ahmed Refaey Hussein, Mounir Hamdi:
Zero-touch realization of Pervasive Artificial Intelligence-as-a-service in 6G networks. CoRR abs/2307.11468 (2023) - [i7]Emanuel Figetakis, Yahuza Bello, Ahmed Refaey, Lei Lei, Medhat Moussa:
Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques. CoRR abs/2309.14395 (2023) - [i6]Zeyad Abdelhay, Yahuza Bello, Ahmed Refaey:
Towards Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism. CoRR abs/2312.17271 (2023) - 2022
- [j25]Hela Chamkhia, Aiman Erbad, Abdulla Khalid Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems. IEEE Internet Things J. 9(9): 6663-6677 (2022) - [j24]Angelo Vera Rivera, Ekram Hossain, Ahmed Refaey Hussein:
Exploring the Intersection of Consortium Blockchain Technologies and Multi-Access Edge Computing: Chronicles of a Proof of Concept Demo. IEEE Open J. Commun. Soc. 3: 2203-2236 (2022) - [j23]Elena Uchiteleva, Serguei Primak, Marco Luccini, Ahmed Refaey Hussein, Abdallah Shami:
The TriLS Approach for Drift-Aware Time-Series Prediction in IIoT Environment. IEEE Trans. Ind. Informatics 18(10): 6581-6591 (2022) - [j22]Yahuza Bello, Ahmed Refaey Hussein, Mehmet Ulema, Juanita Koilpillai:
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond. IEEE Trans. Netw. Serv. Manag. 19(2): 1876-1889 (2022) - [c32]Yahuza Bello, Emanuel Figetakis, Ahmed Refaey, Petros Spachos:
Continuous Integration and Continuous Delivery Framework for SDS. CCECE 2022: 406-410 - [c31]Hela Chamkhia, Aiman Erbad, Abdulla K. Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
PLS Performance Analysis of a Hybrid NOMA-OMA based IoT System with Mobile Sensors. WCNC 2022: 1419-1424 - 2021
- [j21]Yahuza Bello, Alaa Awad Abdellatif, Mhd Saria Allahham, Ahmed Refaey Hussein, Aiman Erbad, Amr Mohamed, Mohsen Guizani:
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core. IEEE Access 9: 158204-158214 (2021) - [j20]Jaspreet Singh, Yahuza Bello, Ahmed Refaey Hussein, Aiman Erbad, Amr Mohamed:
Hierarchical Security Paradigm for IoT Multiaccess Edge Computing. IEEE Internet Things J. 8(7): 5794-5805 (2021) - [j19]Angelo Vera Rivera, Ahmed Refaey, Ekram Hossain:
A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing. IEEE Netw. 35(3): 176-183 (2021) - [c30]Sara Zimmo, Ahmed Refaey, Abdallah Shami:
B5G: Intelligent Coexistence Model for Edge Network. CCECE 2021: 1-5 - [c29]Hela Chamkhia, Aiman Erbad, Abdullah Al-Ali, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System. GLOBECOM (Workshops) 2021: 1-6 - [c28]Angelo Vera Rivera, Ahmed Refaey, Ekram Hossain:
Task Sharing and Scheduling for Edge Computing Servers Using Hyperledger Fabric Blockchain. GLOBECOM (Workshops) 2021: 1-6 - [c27]Yahuza Bello, Mhd Saria Allahham, Ahmed Refaey, Aiman Erbad, Amr Mohamed, Nabil Abdennadher:
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core. ICC Workshops 2021: 1-7 - [c26]Christopher DeSantis, Ahmed Refaey:
MEC-Based Evacuation Planning Using Variance Fractal Dimension Trajectory for Speech Classification. ICC Workshops 2021: 1-6 - [c25]Emanuel Figetakis, Ahmed Refaey:
UAV Path Planning Using on-Board Ultrasound Transducer Arrays and Edge Support. ICC Workshops 2021: 1-6 - [c24]Angelo Vera Rivera, Ahmed Refaey, Ekram Hossain:
Blockchain-Based Collaborative Task Offloading in MEC: A Hyperledger Fabric Framework. ICC Workshops 2021: 1-6 - [c23]Saad Asad, Ahmed Refaey:
On IoT Edge Devices: Manifold Unsupervised Learning for SoM Platforms. IST 2021: 1-5 - [c22]Khaled Almutawa, Radwa Sultan, Ahmed Refaey, Md. Jahidur Rahman:
An Efficient Downlink-QoS Aware Scheduling Approach for Adopting Wyner-Ziv Code. IWCMC 2021: 1919-1924 - [c21]Hela Chamkhia, Abdulla K. Al-Ali, Amr Mohamed, Mohsen Guizani, Aiman Erbad, Ahmed Refaey:
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users. WF-IoT 2021: 633-638 - 2020
- [j18]Elena Uchiteleva, Ahmed Refaey Hussein, Abdallah Shami:
Lightweight Dynamic Group Rekeying for Low-Power Wireless Networks in IIoT. IEEE Internet Things J. 7(6): 4972-4986 (2020) - [j17]Amal Feriani, Ahmed Refaey, Ekram Hossain:
Tracking Pandemics: A MEC-Enabled IoT Ecosystem with Learning Capability. IEEE Internet Things Mag. 3(3): 40-45 (2020) - [j16]Noureddine Mehallegue, Khaled Loukhaoukha, Khalil Zebbiche, Ahmed Refaey, Mourad Djellab:
Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images. Multim. Tools Appl. 79(3-4): 2031-2045 (2020) - [j15]Ahmed Refaey, Karim Hammad, Sebastian Magierowski, Ekram Hossain:
A Blockchain Policy and Charging Control Framework for Roaming in Cellular Networks. IEEE Netw. 34(3): 170-177 (2020) - [j14]Alaa Awad Abdellatif, Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad, Carla-Fabiana Chiasserini, Ahmed Refaey:
ssHealth: Toward Secure, Blockchain-Enabled Healthcare Systems. IEEE Netw. 34(4): 312-319 (2020) - [j13]Jaspreet Singh, Ahmed Refaey, Abdallah Shami:
Multilevel Security Framework for NFV Based on Software Defined Perimeter. IEEE Netw. 34(5): 114-119 (2020) - [j12]Min Li, Helen Tang, Ahmed Refaey Hussein, Xianbin Wang:
A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community. IEEE Open J. Commun. Soc. 1: 282-292 (2020) - [j11]Fuad Shamieh, Xianbin Wang, Ahmed Refaey Hussein:
Transaction Throughput Provisioning Technique for Blockchain-Based Industrial IoT Networks. IEEE Trans. Netw. Sci. Eng. 7(4): 3122-3134 (2020) - [c20]Sumaia Atiwa, Yunus Dawji, Ahmed Refaey, Sebastian Magierowski:
Accelerated Hardware Implementation of BLAKE2 Cryptographic Hash for Blockchain. CCECE 2020: 1-6 - [c19]Zain Khaliq, Paul Mirdita, Ahmed Refaey, Xianbin Wang:
Unsupervised Manifold Alignment for Wifi RSSI Indoor Localization. CCECE 2020: 1-7 - [c18]Yaser Al Mtawa, Harsimranjit Singh, Anwar Haque, Ahmed Refaey:
Smart Home Networks: Security Perspective and ML-based DDoS Detection. CCECE 2020: 1-8 - [c17]Jaspreet Singh, Marwan Dhuheir, Ahmed Refaey, Aiman Erbad, Amr Mohamed, Mohsen Guizani:
Navigation and Obstacle Avoidance System in Unknown Environment. CCECE 2020: 1-4 - [c16]Radwa Sultan, Ahmed Refaey, Walaa Hamouda:
Resource Allocation in CAT-M and LTE-A Coexistence: A Joint Contention Bandwidth Optimization Scheme. CCECE 2020: 1-6 - [c15]Sara Zimmo, Ahmed Refaey, Abdallah Shami:
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark. CCECE 2020: 1-2 - [c14]Hao Ran Chi, Maria de Fátima Domingues, Ahmed Refaey, Ayman Radwan:
Energy-Efficient and QoS-Improved D2D Small Cell Deployment for Smart Grid. GLOBECOM 2020: 1-6 - [c13]Lamiaa Basyoni, Aiman Erbad, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
Proportionally Fair approach for Tor's Circuits Scheduling. ISNCC 2020: 1-6 - [i5]Alaa Awad Abdellatif, Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad, Carla-Fabiana Chiasserini, Ahmed Refaey:
SSHealth: Toward Secure, Blockchain-Enabled Healthcare Systems. CoRR abs/2006.10843 (2020) - [i4]Angelo Vera Rivera, Ahmed Refaey, Ekram Hossain:
A Blockchain Framework for Secure Task Sharing in Multi-access Edge Computing. CoRR abs/2006.14166 (2020) - [i3]Jaspreet Singh, Yahuza Bello, Ahmed Refaey, Amr Mohamed:
Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing. CoRR abs/2007.01246 (2020) - [i2]Lamiaa Basyoni, Aiman Erbad, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
Proportionally Fair approach for Tor's Circuits Scheduling. CoRR abs/2011.07761 (2020)
2010 – 2019
- 2019
- [j10]Ahmed Sallam, Ahmed Refaey, Abdallah Shami:
On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter. IEEE Access 7: 146577-146587 (2019) - [j9]Abdallah Moubayed, Ahmed Refaey, Abdallah Shami:
Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks. IEEE Netw. 33(5): 226-233 (2019) - [c12]Ahmed Sallam, Ahmed Refaey, Abdallah Shami:
Securing Smart Home Networks with Software-Defined Perimeter. IWCMC 2019: 1989-1993 - [c11]Palash Kumar, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami, Juanita Koilpillai:
Performance Analysis of SDP For Secure Internal Enterprises. WCNC 2019: 1-6 - [i1]Ahmed Refaey, Karim Hammad, Sebastian Magierowski, Ekram Hossain:
A Blockchain Policy and Charging Control Framework for Roaming in Cellular Networks. CoRR abs/1906.06350 (2019) - 2018
- [j8]Khaled Loukhaoukha, Ahmed Refaey, Khalil Zebbiche, Abdallah Shami:
Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multim. Tools Appl. 77(8): 9325-9339 (2018) - [c10]Sara Zimmo, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami:
Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization. GLOBECOM 2018: 1-6 - 2017
- [j7]Mohamad Kalil, Arafat Al-Dweik, Mohamed Abu Sharkh, Abdallah Shami, Ahmed Refaey:
A Framework for Joint Wireless Network Virtualization and Cloud Radio Access Networks for Next Generation Wireless Networks. IEEE Access 5: 20814-20827 (2017) - [j6]Khaled Alhazmi, Abdallah Shami, Ahmed Refaey:
Optimized provisioning of SDN-enabled virtual networks in geo-distributed cloud computing datacenters. J. Commun. Networks 19(4): 402-415 (2017) - [c9]Jason Falbo, Ahmed Refaey, Raveendra Rao, Khaled Loukhaoukha:
IOT: Advance physical signaling methods for Power Line networking system. CCECE 2017: 1-5 - [c8]Elena Uchiteleva, Abdallah Shami, Ahmed Refaey:
Time-varying keys for encryption in WSNs: IEEE CNS 17 poster. CNS 2017: 380-381 - [c7]Ahmed Refaey, Khaled Loukhaoukha, Adel Omar Dahmane:
Cryptanalysis of stream cipher using density evolution. CNS 2017: 382-383 - 2016
- [j5]Khaled Loukhaoukha, Ahmed Refaey, Khalil Zebbiche:
Comments on "A robust color image watermarking with singular value decomposition method". Adv. Eng. Softw. 93: 44-46 (2016) - [j4]Khaled Loukhaoukha, Ahmed Refaey, Khalil Zebbiche:
Comments on "Homomorphic image watermarking with a singular value decomposition algorithm". Inf. Process. Manag. 52(4): 644-645 (2016) - 2015
- [j3]Fiona Jiazi Liu, Ahmed Refaey, Xianbin Wang, Helen Tang:
Reliability enhancement for CIR-based physical layer authentication. Secur. Commun. Networks 8(4): 661-671 (2015) - [j2]Khalim Amjad Meerja, Abdallah Shami, Ahmed Refaey:
Hailing cloud empowered radio access networks. IEEE Wirel. Commun. 22(1): 122-129 (2015) - 2014
- [j1]Weikun Hou, Xianbin Wang, Jean-Yves Chouinard, Ahmed Refaey:
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans. Commun. 62(5): 1658-1667 (2014) - [c6]Fuad Shamieh, Ahmed Refaey, Xianbin Wang:
An adaptive compression technique based on real-time RTT feedback. CCECE 2014: 1-5 - [c5]Ahmed Refaey, Raheleh Niati, Xianbin Wang, Jean-Yves Chouinard:
Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment. CNS 2014: 502-503 - 2013
- [c4]Ahmed Refaey, Sébastien Roy, Isabelle LaRoche, Benoit Gosselin:
Locally-connected Viterbi decoder architectures and their VLSI implementation for LDPC and convolutional codes. ACSSC 2013: 505-509 - [c3]Peng Hao, Xianbin Wang, Ahmed Refaey:
An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI. CWIT 2013: 44-48 - [c2]Weikun Hou, Xianbin Wang, Ahmed Refaey:
Secure OFDM transmission based on multiple relay selection and cooperation. GLOBECOM 2013: 712-716 - [c1]Weikun Hou, Xianbin Wang, Ahmed Refaey:
Misbehavior detection in amplify-and-forward cooperative OFDM systems. ICC 2013: 5345-5349
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint