Ahmed Refaey

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Toward Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism.
IEEE Wirel. Commun., April, 2024

Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System.
IEEE Internet Things J., January, 2024

Unified Pandemic Tracking System Based on Open Geospatial Consortium SensorThings API.
CoRR, 2024

Security and High-Availability While Upholding Network Defense Patterns: The Advantages of A2C in O-RAN VNF Placement.
Proceedings of the IEEE International Conference on Communications, 2024

Decentralized Semantic Traffic Control in AVs Using RL and DQN for Dynamic Roadblocks.
Proceedings of the IEEE International Conference on Communications, 2024

Boosting Edge-to-Cloud Data Transmission Efficiency with Semantic Transcoding.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024

On Edge Level: The Impact of Adopting Deep Learning Techniques on Server Design.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024

2023
Learning-Based Neighboring Station Coverage Identification and Dynamic Resource Utilization for 3-D Cells in NR-U Networks.
IEEE Syst. J., December, 2023

Evolved Prevention Strategies for 6G Networks Through Stochastic Games and Reinforcement Learning.
IEEE Netw. Lett., September, 2023

Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks.
IEEE Commun. Mag., February, 2023

6G-Enabled Mobile Access Point Placement via Dynamic Federated Learning Strategies.
IEEE Open J. Commun. Soc., 2023

Quality of service-aware coexistence in unlicensed 5G new radio based on time-domain virtualization.
Int. J. Commun. Syst., 2023

Towards Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism.
CoRR, 2023

Implementation of Real-Time Adversarial Attacks on DNN-based Modulation Classifier.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Optimized Provisioning Techniques for Geo-Distributed SDP-Enabled Next Generation Networks Security.
Proceedings of the IEEE International Conference on Communications, 2023

Autonomous MEC Selection in Federated Next-Gen Networks via Deep Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2023

Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques.
Proceedings of the IEEE Global Communications Conference, 2023

Secure Migration in NGN: An Optimal Stopping Problem Approach with Partial Observability.
Proceedings of the IEEE Global Communications Conference, 2023

2022
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond.
IEEE Trans. Netw. Serv. Manag., 2022

The TriLS Approach for Drift-Aware Time-Series Prediction in IIoT Environment.
IEEE Trans. Ind. Informatics, 2022

Exploring the Intersection of Consortium Blockchain Technologies and Multi-Access Edge Computing: Chronicles of a Proof of Concept Demo.
IEEE Open J. Commun. Soc., 2022

3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems.
IEEE Internet Things J., 2022

PLS Performance Analysis of a Hybrid NOMA-OMA based IoT System with Mobile Sensors.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Continuous Integration and Continuous Delivery Framework for SDS.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2022

2021
A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing.
IEEE Netw., 2021

Hierarchical Security Paradigm for IoT Multiaccess Edge Computing.
IEEE Internet Things J., 2021

B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core.
IEEE Access, 2021

Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

An Efficient Downlink-QoS Aware Scheduling Approach for Adopting Wyner-Ziv Code.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

On IoT Edge Devices: Manifold Unsupervised Learning for SoM Platforms.
Proceedings of the IEEE International Conference on Imaging Systems and Techniques, 2021

Blockchain-Based Collaborative Task Offloading in MEC: A Hyperledger Fabric Framework.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

UAV Path Planning Using on-Board Ultrasound Transducer Arrays and Edge Support.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

MEC-Based Evacuation Planning Using Variance Fractal Dimension Trajectory for Speech Classification.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Task Sharing and Scheduling for Edge Computing Servers Using Hyperledger Fabric Blockchain.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

B5G: Intelligent Coexistence Model for Edge Network.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

2020
Transaction Throughput Provisioning Technique for Blockchain-Based Industrial IoT Networks.
IEEE Trans. Netw. Sci. Eng., 2020

A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community.
IEEE Open J. Commun. Soc., 2020

Multilevel Security Framework for NFV Based on Software Defined Perimeter.
IEEE Netw., 2020

A Blockchain Policy and Charging Control Framework for Roaming in Cellular Networks.
IEEE Netw., 2020

ssHealth: Toward Secure, Blockchain-Enabled Healthcare Systems.
IEEE Netw., 2020

Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images.
Multim. Tools Appl., 2020

Tracking Pandemics: A MEC-Enabled IoT Ecosystem with Learning Capability.
IEEE Internet Things Mag., 2020

Lightweight Dynamic Group Rekeying for Low-Power Wireless Networks in IIoT.
IEEE Internet Things J., 2020

Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing.
CoRR, 2020

Proportionally Fair approach for Tor's Circuits Scheduling.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Energy-Efficient and QoS-Improved D2D Small Cell Deployment for Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2020

Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

Resource Allocation in CAT-M and LTE-A Coexistence: A Joint Contention Bandwidth Optimization Scheme.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

Navigation and Obstacle Avoidance System in Unknown Environment.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

Smart Home Networks: Security Perspective and ML-based DDoS Detection.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

Unsupervised Manifold Alignment for Wifi RSSI Indoor Localization.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

Accelerated Hardware Implementation of BLAKE2 Cryptographic Hash for Blockchain.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2019
Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks.
IEEE Netw., 2019

On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter.
IEEE Access, 2019

Performance Analysis of SDP For Secure Internal Enterprises.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Securing Smart Home Networks with Software-Defined Perimeter.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Efficient and secure cryptosystem for fingerprint images in wavelet domain.
Multim. Tools Appl., 2018

Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Optimized provisioning of SDN-enabled virtual networks in geo-distributed cloud computing datacenters.
J. Commun. Networks, 2017

A Framework for Joint Wireless Network Virtualization and Cloud Radio Access Networks for Next Generation Wireless Networks.
IEEE Access, 2017

Time-varying keys for encryption in WSNs: IEEE CNS 17 poster.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Cryptanalysis of stream cipher using density evolution.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

IOT: Advance physical signaling methods for Power Line networking system.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
Comments on "Homomorphic image watermarking with a singular value decomposition algorithm".
Inf. Process. Manag., 2016

Comments on "A robust color image watermarking with singular value decomposition method".
Adv. Eng. Softw., 2016

2015
Hailing cloud empowered radio access networks.
IEEE Wirel. Commun., 2015

Reliability enhancement for CIR-based physical layer authentication.
Secur. Commun. Networks, 2015

2014
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets.
IEEE Trans. Commun., 2014

Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environment.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

An adaptive compression technique based on real-time RTT feedback.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
Misbehavior detection in amplify-and-forward cooperative OFDM systems.
Proceedings of IEEE International Conference on Communications, 2013

Secure OFDM transmission based on multiple relay selection and cooperation.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI.
Proceedings of the 13th Canadian Workshop on Information Theory, 2013

Locally-connected Viterbi decoder architectures and their VLSI implementation for LDPC and convolutional codes.
Proceedings of the 2013 Asilomar Conference on Signals, 2013


  Loading...