default search action
Amr Abdelaziz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Khaled A. Ghorib, Amr Abdelaziz, Ahmed F. Darwesh, Yahya Mohasseb:
Generalized Index Modulation System and Application for Satellite Communications. NILES 2024: 517-520 - 2023
- [c11]Hassan Yakout El-Arsh, Amr Abdelaziz, Ahmed S. Elliethy, Hussein A. Aly, Alaa Eldin Rohiem Shehata:
Joint Compression-Encryption Technique Based On Arithmetic Coding for JPEG Images. NILES 2023: 63-66 - [i9]Anthony Cioppa, Silvio Giancola, Vladimir Somers, Floriane Magera, Xin Zhou, Hassan Mkhallati, Adrien Deliège, Jan Held, Carlos Hinojosa, Amir M. Mansourian, Pierre Miralles, Olivier Barnich, Christophe De Vleeschouwer, Alexandre Alahi, Bernard Ghanem, Marc Van Droogenbroeck, Abdullah Kamal, Adrien Maglo, Albert Clapés, Amr Abdelaziz, Artur Xarles, Astrid Orcesi, Atom Scott, Bin Liu, Byoungkwon Lim, Chen Chen, Fabian Deuser, Feng Yan, Fufu Yu, Gal Shitrit, Guanshuo Wang, Gyusik Choi, Hankyul Kim, Hao Guo, Hasby Fahrudin, Hidenari Koguchi, Håkan Ardö, Ibrahim Salah, Ido Yerushalmy, Iftikar Muhammad, Ikuma Uchida, Ishay Be'ery, Jaonary Rabarisoa, Jeongae Lee, Jiajun Fu, Jianqin Yin, Jinghang Xu, Jongho Nang, Julien Denize, Junjie Li, Junpei Zhang, Juntae Kim, Kamil Synowiec, et al.:
SoccerNet 2023 Challenges Results. CoRR abs/2309.06006 (2023) - 2022
- [c10]Amr Tarek, Amr Abdelaziz, Hisham Al-Dahshan:
A Fast Decoding Convergence of SISO Repetition - QC-LDPC Codes Concatenated at the Receiver. NILES 2022: 311-316 - [i8]Hassan Yakout El Arsh, Amr Abdelaziz, Ahmed S. Elliethy, Hussein A. Aly, T. Aaron Gulliver:
Information-Theoretic Bounds for Steganography in Multimedia. CoRR abs/2207.04521 (2022) - 2021
- [j3]Ahmed S. Bendary, Amr Abdelaziz, Can Emre Koksal:
Achieving Positive Covert Capacity Over MIMO AWGN Channels. IEEE J. Sel. Areas Inf. Theory 2(1): 149-162 (2021) - [j2]Ahmed Atef Ibrahim, Amr Abdelaziz, Moataz M. Salah:
On the performance of OFDM and single carrier communication over wideband HF channel: theory and practice. Telecommun. Syst. 77(4): 671-682 (2021) - [i7]Hassan Yakout El-Arsh, Amr Abdelaziz, Ahmed S. Elliethy, Hussein A. Aly:
Information-Theoretic Limits for Steganography in Multimedia. CoRR abs/2111.04960 (2021) - 2020
- [c9]Amr Abdelaziz, Mahmoud Mandour, Ashraf D. Elbayoumy, Gamal M. Abdel-Hamid:
Dynamic Channel Allocation Scheme for Handover Calls in Cellular Networks. ICICT 2020: 457-461 - [c8]Hassan Yakout El-Arsh, Amr Abdelaziz, Ahmed S. Elliethy, Hussein A. Aly:
Fundamental Limits Of Steganographic Capacity For Multivariate-Quantized-Gaussian-Distributed Multimedia. ICIP 2020: 1246-1250
2010 – 2019
- 2019
- [j1]Amr Abdelaziz, Ron Burton, Frank Barickman, John Martin, Joshua Weston, Can Emre Koksal:
Enhanced Authentication Based on Angle of Signal Arrivals. IEEE Trans. Veh. Technol. 68(5): 4602-4614 (2019) - [c7]Mahmoud Mandour, Fayez Gebali, Ashraf D. Elbayoumy, Gamal M. Abdel-Hamid, Amr Abdelaziz:
Handover Optimization and User Mobility Prediction in LTE Femtocells Network. ICCE 2019: 1-6 - [c6]Yuksel Ozan Basciftci, Ahmed S. Bendary, Amr Abdelaziz, C. Emre Koksal:
MIMO with Energy Recycling. MobiHoc 2019: 331-340 - [i6]Ahmed S. Bendary, Amr Abdelaziz, C. Emre Koksal:
Positive Covert Capacity of the MIMO AWGN Channels. CoRR abs/1910.13652 (2019) - 2018
- [c5]Amr Abdelaziz, Can Emre Koksal, Ron Burton, Frank Barickman, John Martin, Joshua Weston, Ken Woodruff:
Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO. SPAWC 2018: 1-5 - [i5]Yuksel Ozan Basciftci, Amr Abdelaziz, C. Emre Koksal:
MIMO with Energy Recycling. CoRR abs/1802.01231 (2018) - 2017
- [c4]Amr Abdelaziz, C. Emre Koksal:
Fundamental limits of covert communication over MIMO AWGN channel. CNS 2017: 1-9 - [c3]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy:
On the compound MIMO wiretap channel with mean feedback. ISIT 2017: 734-738 - [i4]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy:
On The Compound MIMO Wiretap Channel with Mean Feedback. CoRR abs/1701.07518 (2017) - [i3]Amr Abdelaziz, Can Emre Koksal:
Fundamental Limits of Covert Communication over MIMO AWGN Channel. CoRR abs/1705.02303 (2017) - 2016
- [c2]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal:
On the security of Angle of Arrival estimation. CNS 2016: 109-117 - [c1]Amr Abdelaziz, Ron Burton, Can Emre Koksal:
Poster: Message authentication and secret key agreement in VANETs via angle of arrival. VNC 2016: 1-2 - [i2]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal:
On The Security of AoA Estimation. CoRR abs/1607.00467 (2016) - [i1]Amr Abdelaziz, Ron Burton, Can Emre Koksal:
Message Authentication and Secret Key Agreement in VANETs via Angle of Arrival. CoRR abs/1609.03109 (2016)
Coauthor Index
aka: C. Emre Koksal
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint