default search action
Ahmed Badawy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Wassim Boudieb, Abdelhamid Malki, Mimoun Malki, Ahmed Badawy, Mahmoud Barhamgi:
Microservice instances selection and load balancing in fog computing using deep reinforcement learning approach. Future Gener. Comput. Syst. 156: 77-94 (2024) - [j13]Muhammad Jamal Shehab, Mohamed Elsayed, Abdullateef Almohamad, Ahmed Badawy, Tamer Khattab, Nizar Zorba, Mazen O. Hasna, Daniele Trinchero:
Terahertz Multiple Access: A Deep Reinforcement Learning Controlled Multihop IRS Topology. IEEE Open J. Commun. Soc. 5: 1072-1087 (2024) - [c19]Rouaa Naim, Hams Gelban, Ahmed Badawy:
Detection and Mitigation of Backdoor Attacks on x-Apps. WISE (5) 2024: 216-230 - 2023
- [c18]Muhammad Jamal Shehab, Ahmed Badawy, Mohamed Elsayed, Tamer Khattab, Daniele Trinchero:
DDPG Performance in THz Communications over Cascaded RISs: A Machine Learning Solution to the Over-Determined System. IWCMC 2023: 210-215 - [c17]Mohammed Omar, Ahmed Badawy, Khalid Abulsaud, Elias Yaacoub, Mohsen Guizani:
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks. SmartNets 2023: 1-6 - [c16]Ahmed Makhlouf, Alaa Awad Abdellatif, Ahmed Badawy, Amr Mohamed:
Optimized Resource and Deep Learning Model Allocation in O-RAN Architecture. WiMob 2023: 155-160 - [i7]Muhammad Jamal Shehab, Abdullateef Almohamad, Mohamed Elsayed, Ahmed Badawy, Tamer Khattab, Nizar Zorba, Mazen O. Hasna, Daniele Trinchero:
Terahertz Multiple Access: A Deep Reinforcement Learning Controlled Multihop IRS Topology. CoRR abs/2303.09476 (2023) - 2022
- [j12]Mohamed Elsayed, Ahmed Badawy, Ahmed El Shafie, Amr Mohamed, Tamer Khattab:
A Deep Reinforcement Learning Framework for Data Compression in Uplink NOMA-SWIPT Systems. IEEE Internet Things J. 9(14): 11656-11674 (2022) - 2020
- [j11]Ahmed Badawy, Ahmed El Shafie, Tamer Khattab:
On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum. IEEE Commun. Lett. 24(4): 739-743 (2020) - [j10]Ahmed Badawy, Ahmed El Shafie:
Securing OFDM-Based NOMA SWIPT Systems. IEEE Trans. Veh. Technol. 69(10): 12343-12347 (2020) - [j9]Ahmed Badawy, Tarek Elfouly, Tamer Khattab, Carla-Fabiana Chiasserini, Daniele Trinchero:
Order Statistics-Based Design of UWB Receivers. IEEE Wirel. Commun. Lett. 9(9): 1427-1431 (2020) - [c15]Mohamed Elsayed, Ahmed Badawy, Ahmed El Shafie, Amr Mohamed, Tamer Khattab:
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol. CCECE 2020: 1-6 - [i6]Ahmed Badawy, Ahmed El Shafie, Tamer Khattab:
On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum. CoRR abs/2001.07828 (2020) - [i5]Ahmed Badawy, Ahmed El Shafie:
Securing OFDM-Based NOMA SWIPT Systems. CoRR abs/2008.07039 (2020)
2010 – 2019
- 2019
- [j8]Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla K. Al-Ali, Khaled A. Harras, Mohsen Guizani:
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions. IEEE Commun. Surv. Tutorials 21(4): 3340-3385 (2019) - 2018
- [c14]Duaa Abumaali, Ahmed Badawy, Tamer Khattab:
On the Achievable Degrees of Freedom of a Relay Aided X-Channel. IWCMC 2018: 823-827 - [i4]Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla K. Al-Ali, Khaled A. Harras, Mohsen Guizani:
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions. CoRR abs/1810.09729 (2018) - [i3]Tara Salman, Ahmed Badawy, Tarek M. El-Fouly, Amr Mohamed, Tamer Khattab:
Estimating the Number of Sources: An Efficient Maximization Approach. CoRR abs/1810.09850 (2018) - 2017
- [b1]Ahmed Badawy:
Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio. Polytechnic University of Turin, Italy, 2017 - [j7]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek M. Elfouly, Amr Mohamed:
A Simple Cross Correlation Switched Beam System (XSBS) for Angle of Arrival Estimation. IEEE Access 5: 3340-3352 (2017) - [j6]Ahmed Badawy, Tarek M. El-Fouly, Carla-Fabiana Chiasserini, Tamer Khattab, Daniele Trinchero:
Exploiting spectrum sensing data for key management. Comput. Commun. 97: 31-39 (2017) - [j5]Adam B. Noel, Abderrazak Abdaoui, Tarek Elfouly, Mohamed Hossam Ahmed, Ahmed Badawy, Mohamed S. Shehata:
Structural Health Monitoring Using Wireless Sensor Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 19(3): 1403-1423 (2017) - [j4]Ahmed Badawy, Tara Salman, Tarek Elfouly, Tamer Khattab, Amr Mohamed, Mohsen Guizani:
Estimating the number of sources in white Gaussian noise: simple eigenvalues based approaches. IET Signal Process. 11(6): 663-673 (2017) - [j3]Ahmed Badawy, Richard S. Wolff:
A Hardware Based Ricean Fading Radio Channel Simulator. Wirel. Pers. Commun. 93(3): 615-627 (2017) - [c13]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek ElFouly, Amr Mohamed:
A Simple Angle of Arrival Estimation System. WCNC 2017: 1-6 - 2016
- [j2]Ahmed Badawy, Tarek M. El-Fouly, Tamer Khattab, Amr Mohamed, Mohsen Guizani:
Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys. Commun. 19: 1-10 (2016) - [j1]Ahmed Badawy, Tarek M. El-Fouly, Tamer Khattab, Carla-Fabiana Chiasserini, Amr Mohamed, Daniele Trinchero:
Robust secret key extraction from channel secondary random process. Wirel. Commun. Mob. Comput. 16(11): 1389-1400 (2016) - [c12]Ahmed Badawy, Tarek M. Elfouly, Tamer Khattab, Carla-Fabiana Chiasserini, Daniele Trinchero:
Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks. CCECE 2016: 1-6 - [c11]Ghazanfar Ali, Ahmed Badawy, Hans G. Kerkhoff:
Accessing on-chip temperature health monitors using the IEEE 1687 standard. ICECS 2016: 776-779 - [c10]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Carla-Fabiana Chiasserini, Daniele Trinchero:
On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks. WCNC 2016: 1-6 - 2015
- [c9]Ahmed Badawy, Emad Hegazi:
A low voltage low power and high speed binary search analog to digital converter. ICECS 2015: 280-283 - [c8]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Carla-Fabiana Chiasserini, Amr Mohamed, Daniele Trinchero:
Channel secondary random process for robust secret key generation. IWCMC 2015: 114-119 - [c7]Tara Salman, Ahmed Badawy, Tarek M. Elfouly, Amr Mohamed, Tamer Khattab:
Estimating the number of sources: An efficient maximization approach. IWCMC 2015: 199-204 - [c6]Ahmed Badawy, Tamer Khattab, Tarek M. El-Fouly, Amr Mohamed, Daniele Trinchero, Carla-Fabiana Chiasserini:
Secret Key Generation Based on AoA Estimation for Low SNR Conditions. VTC Spring 2015: 1-7 - 2014
- [c5]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed, Daniele Trinchero:
Secret key generation based on channel and distance measurements. ICUMT 2014: 136-142 - [c4]Ahmed Badawy, Tamer Khattab:
A novel peak search & save cyclostationary feature detection algorithm. WCNC 2014: 253-258 - [c3]Tara Salman, Ahmed Badawy, Tarek M. Elfouly, Tamer Khattab, Amr Mohamed:
Non-data-aided SNR estimation for QPSK modulation in AWGN channel. WiMob 2014: 611-616 - [i2]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek M. Elfouly, Amr Mohamed:
A Simple AoA Estimation Scheme. CoRR abs/1409.5744 (2014) - [i1]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed, Daniele Trinchero, Carla-Fabiana Chiasserini:
Secret Key Generation Based on AoA Estimation for Low SNR Conditions. CoRR abs/1411.2208 (2014) - 2013
- [c2]Ahmed Badawy, Tamer Khattab:
A hybrid spectrum sensing technique with multiple antenna based on GLRT. WiMob 2013: 736-742 - [c1]Ahmed Badawy, Richard S. Wolff:
A hardware based Ricean fading radio channel simulator. WPMC 2013: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint