Ahmed El Shafie

Orcid: 0000-0002-7315-8242

Affiliations:
  • Qatar University, Doha


According to our database1, Ahmed El Shafie authored at least 106 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Securing Full-Duplex Amplify-and-Forward Relay-Aided Communications Through Processing-Time Optimization.
IEEE Trans. Veh. Technol., 2022

Enhanced physical layer security for energy harvesting relay-aided systems using joint relaying scheme.
Internet Technol. Lett., 2022

A Deep Reinforcement Learning Framework for Data Compression in Uplink NOMA-SWIPT Systems.
IEEE Internet Things J., 2022

2021
Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems.
CoRR, 2021

Securing Full-Duplex Amplify-and-Forward Relay-Aided Transmissions Through Processing-Time Optimization.
CoRR, 2021

Secure AF Relaying in Power-Constrained UAV Networks.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

2020
Securing OFDM-Based NOMA SWIPT Systems.
IEEE Trans. Veh. Technol., 2020

Relay-Selection Refinement Scheme for Secrecy in Untrusted RF-EH Relay Systems With Adaptive Transmission Under Outdated CSI.
IEEE Trans. Green Commun. Netw., 2020

Security and Energy Harvesting for MIMO-OFDM Networks.
IEEE Trans. Commun., 2020

Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers.
IEEE Syst. J., 2020

Artificial-Noise-Aided Energy-Efficient Secure Beamforming for Multi-Eavesdroppers in Cognitive Radio Networks.
IEEE Syst. J., 2020

On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum.
IEEE Commun. Lett., 2020

Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2019
On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes.
IEEE Trans. Wirel. Commun., 2019

Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks.
IEEE Trans. Commun., 2019

Introduction to the special section on deep reinforcement learning for future wireless communication networks.
IEEE Trans. Cogn. Commun. Netw., 2019

Impact of Passive and Active Security Attacks on MIMO Smart Grid Communications.
IEEE Syst. J., 2019

Comparison Between TDMA and Random Multiple-Access Energy-Harvesting Networks Under Security Constraints.
IEEE Commun. Lett., 2019

Wiretap TDMA Networks With Energy-Harvesting Rechargeable-Battery Buffered Sources.
IEEE Access, 2019

Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret Key Aided Schemes.
IEEE Access, 2019

2018
A Secret-Key-Aided Scheme to Secure Transmissions From Single-Antenna RF-EH Source Nodes.
IEEE Wirel. Commun. Lett., 2018

Thresholds Optimization for One-Bit Feedback Multi-User Scheduling.
IEEE Wirel. Commun. Lett., 2018

Secure Beamforming in Full-Duplex MISO-SWIPT Systems With Multiple Eavesdroppers.
IEEE Trans. Wirel. Commun., 2018

Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks.
IEEE Trans. Veh. Technol., 2018

Secure Sum-Rate-Optimal MIMO Multicasting Over Medium-Voltage NB-PLC Networks.
IEEE Trans. Smart Grid, 2018

Energy-efficient cooperative cognitive relaying schemes for cognitive radio networks.
Phys. Commun., 2018

Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers.
CoRR, 2018

Adaptive Transmission for Secure AN-Aided Cooperative Networks with RF-EH Untrusted Relaying using Outdated CSI.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Security in MIMO-OFDM SWIPT Networks.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

An Artificial-Noise-Aided Secure Scheme for Hybrid Parallel PLC/Wireless OFDM Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Securing SC-FDE Uplink Transmissions Using Temporal Artificial Noise under Three Detection Strategies.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Secure Beamforming in Full-Duplex SWIPT Systems with Loopback Self-Interference Cancellation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A hybrid artificial-noise and secret-key scheme for securing OFDM transmissions in V2G networks.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Securing OFDM-based wireless links using temporal artificial-noise injection.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Efficient AN-Aided Scheme to Power RF-EH Source Nodes and Secure Their Transmissions.
IEEE Wirel. Commun. Lett., 2017

A Secure Relay Selection AN-Aided Scheme for Dual-Hop DF Relay Networks With Two-Sided Eavesdropping.
IEEE Wirel. Commun. Lett., 2017

QoS-Aware Enhanced-Security for TDMA Transmissions from Buffered Source Nodes.
IEEE Trans. Wirel. Commun., 2017

Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems.
IEEE Trans. Veh. Technol., 2017

AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems.
IEEE Trans. Green Commun. Netw., 2017

Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair.
IEEE Commun. Lett., 2017

An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems.
IEEE Commun. Lett., 2017

Security of an Ordered-Based Distributive Jamming Scheme.
IEEE Commun. Lett., 2017

Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping.
IEEE Commun. Lett., 2017

On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications.
CoRR, 2017

Secure Beamforming in Full-Duplex SWIPT Systems.
CoRR, 2017

Mutual Information of Buffer-Aided Full-Duplex Relay Channels.
CoRR, 2017

Achievable Rates of Buffer-Aided Full-Duplex Gaussian Relay Channels.
IEEE Access, 2017

Impact of the Wireless Network's PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid.
IEEE Access, 2017

Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals.
IEEE Access, 2017

Enhancing the reliability of two-way vehicle-to-grid communications.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

2016
On the coexistence of a primary user with an energy harvesting secondary user: a case of cognitive cooperation.
Wirel. Commun. Mob. Comput., 2016

Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks.
IEEE Wirel. Commun. Lett., 2016

Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks.
IEEE Wirel. Commun. Lett., 2016

Secure Communications in the Presence of a Buffer-Aided Wireless-Powered Relay With Self-Energy Recycling.
IEEE Wirel. Commun. Lett., 2016

Maximum Secondary Stable Throughput of a Cooperative Secondary Transmitter-Receiver Pair: Protocol Design and Stability Analysis.
IEEE Trans. Veh. Technol., 2016

Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System.
IEEE Commun. Lett., 2016

Artificial-Noise-Aided Secure MIMO Full-Duplex Relay Channels With Fixed-Power Transmissions.
IEEE Commun. Lett., 2016

Throughput of a cooperative energy harvesting secondary user in cognitive radio networks.
Trans. Emerg. Telecommun. Technol., 2016

Relay-Assisted Primary and Secondary Transmissions in Cognitive Radio Networks.
IEEE Access, 2016

QoS-Based Design for Security Enhancement in TDMA-Based Wireless Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Spatio-Temporal Artificial Noise Design for Secure MISOSE-OFDM Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Cyclostationary Noise Modeling Based on Frequency-Shift Filtering in NB-PLC.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
On Secure Communications Over a Wiretap Channel With Fixed-Rate Transmission: Protocol Design and Queueing Analysis.
IEEE Wirel. Commun. Lett., 2015

On Orthogonal Band Allocation for Multiuser Multiband Cognitive Radio Networks: Stability Analysis.
IEEE Trans. Commun., 2015

A Sparsity-Aware Cooperative Protocol for Cognitive Radio Networks With Energy-Harvesting Primary User.
IEEE Trans. Commun., 2015

Comments on "Optimal utilization of a cognitive shared channel with a rechargeable primary source node".
J. Commun. Networks, 2015

On the Design of a Relay-Assisted Network.
IEEE Commun. Lett., 2015

A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the Presence of an Eavesdropper.
IEEE Commun. Lett., 2015

On the design of relay-assisted primary-secondary networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Exploiting sparsity of relay-assisted cognitive radio networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks with Node Buffers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

MMSE sparse beamforming for power-constrained large two-way relay AF networks.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

Energy-efficient cooperative relaying protocol for full-duplex cognitive radio users and delay-aware primary users.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

On spectrum sharing between energy harvesting cognitive radio users and primary users.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Interference-based optimal power-efficient access scheme for cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Throughput maximization for buffer-aided hybrid half-/full-duplex relaying with self-interference.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
Cognitive Access Protocol for Alleviating Sensing Errors in Cognitive Multiple-Access Systems.
IEEE Wirel. Commun. Lett., 2014

Optimization of a Relay-Assisted Link With Buffer State Information at the Source.
IEEE Commun. Lett., 2014

Space-Time Coding for an Energy Harvesting Cooperative Secondary Terminal.
IEEE Commun. Lett., 2014

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging.
EAI Endorsed Trans. Cogn. Commun., 2014

Relay-Assisted Primary and Secondary Transmissions.
CoRR, 2014

Energy-Efficient Cooperative Cognitive Relaying Protocols for Full-Duplex Cognitive Radio Users and Delay-Aware Primary Users.
CoRR, 2014

On Orthogonal Band Allocation for Multi-User Mutli-Band Cognitive Radio Networks.
CoRR, 2014

Optimal Cooperative Cognitive Relaying and Spectrum Access for an Energy Harvesting Cognitive Radio: Reinforcement Learning Approach.
CoRR, 2014

Cooperative Cognitive Relaying Protocol for an Energy Harvesting Cognitive Radio User.
CoRR, 2014

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users.
CoRR, 2014

Maximum throughput of a secondary user cooperating with an energy-aware primary user.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Band allocation for cognitive radios with buffered primary and secondary users.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Protocol design and stability analysis of cooperative cognitive radio users.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Spectrum-Aggregating Cognitive Multi-Antenna User with Multiple Primary Users.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Probabilistic band-splitting for a buffered cooperative cognitive terminal.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Maximum throughput of a cooperative energy harvesting cognitive radio user.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Throughput maximization via adjusting packet size of a buffered cognitive radio user.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Cooperative cognitive relaying under primary and secondary quality of service satisfaction.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

2013
Stability Analysis of an Ordered Cognitive Multiple-Access Protocol.
IEEE Trans. Veh. Technol., 2013

Optimal Random Access for a Cognitive Radio Terminal with Energy Harvesting Capability.
IEEE Commun. Lett., 2013

Cooperation Between a Primary Terminal and an Energy Harvesting Cognitive Radio Terminal.
CoRR, 2013

Optimal selection of spectrum sensing duration for an energy harvesting cognitive radio.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Transmit and receive cooperative cognition: Protocol design and stability analysis.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

2012
Optimal Spectrum Access for Cognitive Radios
CoRR, 2012

Cooperation via Cognitive System: Protocol Design and Performance Analysis
CoRR, 2012

Optimal random access and random spectrum sensing for an energy harvesting cognitive radio.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Cooperative cognitive relaying with ordered cognitive multiple access.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...