Ahmed A. Zewail
Orcid: 0000-0002-8618-5952
According to our database1,
Ahmed A. Zewail
authored at least 35 papers
between 2013 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Benefits of Edge Caching With Coded Placement for Asymmetric Networks and Shared Caches.
IEEE J. Sel. Areas Inf. Theory, 2021
2020
2019
IEEE Trans. Commun., 2019
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
An Optimization Framework for Secure Delivery in Heterogeneous Coded Caching Systems.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019
2018
Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays.
IEEE J. Sel. Areas Commun., 2018
Proceedings of the 2018 Information Theory and Applications Workshop, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Using network coding to achieve the capacity of deterministic relay networks with relay messages.
Wirel. Commun. Mob. Comput., 2016
IEEE J. Sel. Areas Commun., 2016
Two-Hop Untrusted Relay Channel with an External Eavesdropper under Layered Secrecy Constraints.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016
2015
Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships.
IEEE J. Sel. Top. Signal Process., 2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015
2014
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
Proceedings of the 2013 IEEE Information Theory Workshop, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013