• Channel secondary random process for robust secret key generation 

      Badawy A.; Khattab T.; Elfouly T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
    • Deep learning and low rank dictionary model for mHealth data classification 

      Said A.B.; Mohamed A.; Elfouly T.; Abualsaud K.; Harras K. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the context of mobile Health (mHealth) applications, data are prone to several sources of contamination which would lead to false interpretation and misleading classification results. In this paper, a robust deep learning ...
    • Energy-cost-distortion optimization for delay-sensitive M-health applications 

      Awad A.; Mohamed A.; Elfouly T. ( IEEE Computer Society , 2015 , Conference Paper)
      Mobile-health (m-health) systems leverage wireless and mobile communication technologies to promote new ways to acquire, process, transport, and secure the raw and processed medical data to provide the scalability needed ...
    • Evolution of Internet of Things from Blockchain to IOTA: A Survey 

      Alshaikhli M.; Elfouly T.; Elharrouss O.; Mohamed A.; Ottakath N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Internet of Things (IoT) is the new paradigm to the scaling nature of things and their elements, interconnected, exchanging data over a network supported with nodes. The Ubiquitous use of tiny devices and embedded sensor ...
    • Multimodal deep learning approach for Joint EEG-EMG Data compression and classification 

      Ben Said A.; Mohamed A.; Elfouly T.; Harras K.; Wang Z.J. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      In this paper, we present a joint compression and classification approach of EEG and EMG signals using a deep learning approach. Specifically, we build our system based on the deep autoencoder architecture which is designed ...
    • Optimal Consensus Time Synchronizations for Wireless Sensor Networks 

      Abdaoui A.; Tariq H.; Touati F.; Elfouly T.; Al-Hitmi M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Wireless Sensor Networks (WSNs) have received an important consideration in recent years regarding its broad area of applications. Time synchronization is one of the most important challenges of WSNs. This paper proposes ...
    • Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques 

      Al-Sahan L.; Al-Jabiri F.; Abdelsalam N.; Mohamed A.; Elfouly T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      National security is a top priority to mitigate intrusions and criminal acts. Governments require robust national surveillance system that can cover all geographical areas, including the blind spots that may hold violence ...
    • Robust secret key extraction from channel secondary random process 

      Badawy A.; Elfouly T.; Khattab T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( John Wiley and Sons Ltd , 2016 , Conference Paper)
      The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
    • Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF 

      Amir M.; Khattab T.; Elfouly T.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
    • UAV-based Semi-Autonomous Data Acquisition and Classification 

      Said A.B.; Mohamed A.; Elfouly T.; Abualsaud K.; Harras K. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the context of mobile Health (mHealth) applications, data are prone to several sources of contamination which would lead to false interpretation and misleading classification results. In this paper, a robust deep learning ...