Tarek M. El-Fouly

Orcid: 0000-0002-1688-6163

Affiliations:
  • Qatar University, Electrical Engineering Department, Qatar


According to our database1, Tarek M. El-Fouly authored at least 57 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Harnessing the Heart's Magnetic Field for Advanced Diagnostic Techniques.
Sensors, September, 2024

Federated Learning: A Paradigm Shift in Cybersecurity for Smart Grids.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2024

2023
Caching Through the Skies: The Case of LEO Satellites Connected Edges for 6G and Beyond.
CoRR, 2023

2022
A Comprehensive Review of Lithium-Ion Batteries Modeling, and State of Health and Remaining Useful Lifetime Prediction.
IEEE Access, 2022

Evolution of Internet of Things From Blockchain to IOTA: A Survey.
IEEE Access, 2022

Energy-Efficient Proactive Scheduling Policies for Finite-Buffer Regular Service Guarantees.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

2021
Towards Information Theoretic Interpretation of Practical Ciphers.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
Order Statistics-Based Design of UWB Receivers.
IEEE Wirel. Commun. Lett., 2020

Optimal Consensus Time Synchronizations for Wireless Sensor Networks.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Minimising number of sensors in wireless sensor networks for structure health monitoring systems.
IET Wirel. Sens. Syst., 2019

A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era.
IEEE Access, 2019

2018
Secure Spatial Multiple Access Using Directional Modulation.
IEEE Trans. Wirel. Commun., 2018

A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems.
IEEE Access, 2018

Deep learning and low rank dictionary model for mHealth data classification.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications.
IEEE Trans. Control. Netw. Syst., 2017

Distributed in-network processing and resource optimization over mobile-health systems.
J. Netw. Comput. Appl., 2017

Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring.
J. Netw. Comput. Appl., 2017

Estimating the number of sources in white Gaussian noise: simple eigenvalues based approaches.
IET Signal Process., 2017

Structural Health Monitoring Using Wireless Sensor Networks: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2017

Exploiting spectrum sensing data for key management.
Comput. Commun., 2017

Maximizing Lifetime in Wireless Sensor Network for Structural Health Monitoring With and Without Energy Harvesting.
IEEE Access, 2017

A Simple Cross Correlation Switched Beam System (XSBS) for Angle of Arrival Estimation.
IEEE Access, 2017

Multimodal Deep Learning Approach for Joint EEG-EMG Data Compression and Classification.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Simple Angle of Arrival Estimation System.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Network Association with Dynamic Pricing over D2D-Enabled Heterogeneous Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Deep learning approach for EEG compression in mHealth system.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
Robust secret key extraction from channel secondary random process.
Wirel. Commun. Mob. Comput., 2016

Unleashing the secure potential of the wireless physical layer: Secret key generation methods.
Phys. Commun., 2016

On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels.
CoRR, 2016

On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Performance evaluation of experimental damage detection in structure health monitoring using acceleration.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Secure multiple-users transmission using multi-path directional modulation.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed.
Comput. Networks, 2015

Energy-cost-distortion optimization for delay-sensitive M-health applications.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

Routing and flow rate assignment using multi-objective optimization in wireless sensor networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Secret Key Generation Based on AoA Estimation for Low SNR Conditions.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

Estimating the number of sources: An efficient maximization approach.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Comparative simulation for physical layer key generation methods.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Multi-objective sensor placement using the effective independence model (SPEM) for wireless sensor networks in structural health monitoring.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Channel secondary random process for robust secret key generation.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
TOSSIM and distributed binary consensus algorithm in wireless sensor networks.
J. Netw. Comput. Appl., 2014

A Simple AoA Estimation Scheme.
CoRR, 2014

On the degrees of freedom of the MIMO Wiretap and MIMO broadcast channels with unknown eavesdroppers.
CoRR, 2014

On the degrees of freedom of MIMO Multiple access channel with multiple eavesdroppers.
CoRR, 2014

Non-data-aided SNR estimation for QPSK modulation in AWGN channel.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Secret key generation based on channel and distance measurements.
Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2014

A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Binary consensus in sensor motes.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Distributed binary consensus algorithm and wireless sensor network.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

On the distributed binary consensus algorithm in wireless sensor networks.
Proceedings of the 7th International Conference on Signal Processing and Communication Systems, 2013

2012
QUMESH: Wireless mesh network deployment and configuration in harsh environment.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

2011
Video acquisition between USB 2.0 CMOS camera and embedded FPGA system.
Proceedings of the 5th International Conference on Signal Processing and Communication Systems, 2011

2008
Efficient Forward Error Correction for Reliable Transmission in Packet Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008


  Loading...