Get my own profile
Public access
View all6 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Charles KamhouaUS Army Research Laboratory, Network Security BranchVerified email at army.mil
George AtiaAssociate Professor, University of Central FloridaVerified email at ucf.edu
Mina GuirguisProfessor, Computer Science Dept., Texas State UniversityVerified email at bu.edu
Nandi LesliePrincipal Technical Fellow, Raytheon TechnologiesVerified email at rtx.com
Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
Tamer ElBattProfessor, Wireless Communications and Networks, The American University in CairoVerified email at ieee.org
Ahmed H. ZahranLecturer, University College Cork, IrelandVerified email at cs.ucc.ie
Karim G. SeddikProfessor, Associate Dean for Graduate Studies and Research, American University in CairoVerified email at aucegypt.edu
Anjon BasakDEVCOM Army Research Laboratory (RAP)Verified email at miners.utep.edu
Amr MohamedProfessor, Qatar University, senior member IEEEVerified email at qu.edu.qa
M Majid ButtNokia Bell LabsVerified email at nokia.com
Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
Ahmed ElshafieWireless Sys. Engineer at Apple, Editor IEEE TCOM, Senior Editor IEEE COMM LETTERS, Senior IEEEVerified email at apple.com
Follow
Ahmed H. Anwar, (Ahmed Hemida)
Other namesAhmed Hemida
Research Scientist, US Army Research Laboratory
Verified email at knights.ucf.edu