Associate Professor, Electrical & Computer Engineering
Ph.D., Université Laval, QC, Canada.
M.Sc., Alexandria University, Alexandria, Egypt.
B.Sc., Alexandria University, Alexandria, Egypt.
ECE 727 - Computer Networks
ECEG 520 - Computer Architecture
ECEG 721 - Embedded Systems
EECE 522 - Mobile Communication Networks
EECE 232 - Computer Organization
EECE 420-421 - Capstone Projects
- AI-Adaptive Communication Systems and Networks Security
- IIoT/Emerging Communications/Computing Technologies and Applications
- Embedded Systems/FPGA Prototypes Implementation
Publications and Scholarly Activities
[P-1] Xianbin Wang and Ahmed Refaey, “System, Apparatus, and Methodology for Asymmetrical Transceiver in Short Range High-Speed Wireless Communications” US Patent office, # 20140177753 A1. Granted, Canadian Patent Office, App. # 2,837,272.
[P-2] Ahmed Refaey, Khaled Loukhaoukha, and Gamal Refai-Ahmed, “Video/Audio Wireless Broadcasting Distribution Using Multi Ranges WiFi Access Points” Patent Application,
WiCastingCanada, Canadian Patent Office, App. # 2,916,469.
[P-3] Ahmed Refaey, “Movement Monitoring System using Wireless Access Points for Healthcare Applications,” Patent Application, Canadian Patent Office, 2018 App. # 2,919,096.
[P-3] Ahmed Refaey, “Network Security Flow Control Using Machine Learning,” Patent Application, Canadian Patent Office, 2018 App. # ---.
[J-31] Paul Mirdita, Zain Khaliq, Ahmed Refaey, Xianbin Wang "Localization for Intelligent Systems Using Unsupervised Learning and Prediction Approaches," Accepted In IEEE-CJECE, Feb. 2021.
[J-30] Sara Zimmo, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami "Power- Aware Coexistence of Wi-Fi and LTE in the Unlicensed Band using Time-Domain Virtualization," Accepted In IEEE-CJECE, Jan. 2020.
[J-29] Jaspreet Singh, Yahuza Bello, and Ahmed Refaey, and Amr Mohamed "Hierarchical Security Paradigm for IoT Multi-access Edge Computing," IEEE IoT Journal, Accepted in Oct. 2020.[https://ieeexplore.ieee.org/document/9237982]
[J-28] F. Shamieh, X. Wang and Ahmed Refaey, “Transaction Throughput Provisioning Technique for Blockchain-based Industrial IoT Networks,” IEEE Transactions on Network Science and Engineering, Accepted in Aug 2020. doi: 10.1109/TNSE.2020.3017389. [https://ieeexplore.ieee.org/document/9171591]
[J-27] Jaspreet Singh, Ahmed Refaey, and Juanita Koilpillai "Adoption of the Software-Defined Perimeter Architecture for Infrastructure as a Service," IEEE-CJECE, Vol. 43, no. 4, pp. 357-363, Fall 2020. [https://ieeexplore.ieee.org/document/9240082?source=authoralert].
[J-26] A. Rivera, Ahmed Refaey, and E. Hossain, "A blockchain framework for secure task-sharing in multi-access edge computing," IEEE Network, Accepted in Aug 2020. to appear. [https://ieeexplore.ieee.org/document/9210139]
[J-25] A. Feriani, Ahmed Refaey, and E. Hossain, "Tracking pandemics: A MEC-enabled IoT ecosystem with learning capability," IEEE IoT Magazine, Special Issue on "Smart IoT Solutions for Combating the COVID-19 Pandemic," vol. 3, no. 3, pp. 40-45, September 2020.[https://ieeexplore.ieee.org/document/9241470]
[J-24] Jaspreet Singh, Ahmed Refaey, and Abdallah Shami" On the Security of NFV: A Completed Secure and Scalable Framework Using the Software-defined Perimeter," Accepted- IEEE Networks, Mar. 2020. [https://ieeexplore.ieee.org/abstract/document/8826550]
[J-23] A. Abdellatif, A. Al-Marridi, A. Mohamed, A. Erbad, and Ahmed Refaey, "SSHealth: Toward Secure, Blockchain-enabled Healthcare Systems" Accepted- IEEE Networks, Mar. 2020. [https://ieeexplore.ieee.org/abstract/document/9076126]
[J-22] Elena Uchiteleva, Ahmed Refaey, and Abdallah Shami "Lightweight Dynamic Re-Keying Algorithm for Encryption in Low Power WSNs," IEEE IoT Journal, vol. 7, no. 6, pp. 4972-4986, June 2020. [https://ieeexplore.ieee.org/abstract/document/9001126]
[J-21] Min Li, Helen Tang, Ahmed Refaey, and Xianbin Wang "A Sidechain-based Decentralized Authentication Scheme via Optimized Two-way Peg Protocol for Smart Community," IEEE ComSoc Journal, vol. 1, pp. 282-292, Feb. 2020. [https://ieeexplore.ieee.org/document/9013015]
[J-20] Ahmed Refaey, Karim Hammad, Sebastian Magrawaski, and Ekram Hossain " A Blockchain Policy and Charging Control Framework for MNOs," IEEE Networks, Accepted, Oct. 2019. [https://ieeexplore.ieee.org/abstract/document/8910631]
[J-19] Ahmed Refaey, Ahmed Sallam, and Abdallah Shami, "On IoT Applications: a Proposed SDP Framework for MQTT," Accepted IET Letter, August 2019. [https://digital-library.theiet.org/content/journals/10.1049/el.2019.2334 ]
[J-18] Ahmed Sallam, Ahmed Refaey, and Abdallah Shami, " On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-defined Perimeter," IEEE Access, Accepted, August 2019. [https://ieeexplore.ieee.org/abstract/document/8826550]
[J-17] Abdallah Moubayed, Ahmed Refaey, and Abdallah Shami, " Software Defined Perimeter: State of the Art Secure Solution for Modern Networks," IEEE Network, Accepted Feb 2019 [https://ieeexplore.ieee.org/abstract/document/8863736]
[J-16] N. Mehallegue, K. Loukhaoukha, K. Zebbiche, Ahmed Refaey, and M. Djellab "Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted image," Springer Journal of Multimedia Tools and Applications, issn 1573-7721, Nov. 2018. [https://link.springer.com/article/10.1007/s11042-019-08271-z]
[J-15]Mohamad Kalil, A. Al-Dweik, Abdallah Shami, and A. Refaey "A Framework for Joint Wireless Network Virtualization and Cloud Radio Access Networks for Next Generation Wireless Networks," IEEE Access, Volume: PP, Issue: 99, Aug 2017. [https://ieeexplore.ieee.org/abstract/document/8022863]
[J-14] Khaled Alhazmi, Abdallah Shami, and Ahmed Refaey, "Optimized Provisioning of SDN-enabled Virtual Networks in Geo-distributed Cloud Computing Datacenters" Journal of Communications and Networks (IEEE), Volume: 19, Issue: 4, August 2017. [https://ieeexplore.ieee.org/abstract/document/8036663]
[J-13] K. Loukhaoukha, A. Refaey, K. Zebbiche, and A. Shami, "Efficient and secure cryptosystem for fingerprint images in the wavelet domain," Multimedia Tools and Applications, In Press by Springer, Available online 22 June 2017 (Impact factor: 1.541). [https://link.springer.com/article/10.1007/s11042-017-4938-9]
[J-12] Elena Uchiteleva, Abdallah Shami, and Ahmed Refaey "Virtualization of Wireless Sensor Networks: Throughput- and Time-Based Resource Scheduling," IEEE Journal of Sensor Networks, vol. 17, no. 5, pp. 1562-1576, Mar. 2017 (Impact factor: 2.617). [https://ieeexplore.ieee.org/abstract/document/7795235]
[J-11] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Ambiguity attacks on robust
blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," Journal of Electrical Systems and Information Technology, In Press by Elsevier, January 2017. [https://www.sciencedirect.com/science/article/pii/S2314717216301179]
[J-10] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Comments on "Homomorphic image watermarking with a singular value decomposition algorithm"," Information Processing & Management, vol. 52, no. 4, pp. 644 645, July 2016.[https://www.sciencedirect.com/science/article/pii/S0306457315001466]
[J-9] Khalim A. Meerja, Abdallah Shami, and Ahmed Refaey, "Hailing cloud empowered radio access networks," IEEE Wireless Communications, vol.22, no.1, pp.122-129, February 2015. [https://ieeexplore.ieee.org/document/7054727]
[J-8] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Comments "On a Robust Color Image Watermarking with Singular Value Decomposition Method"," Advances in Engineering Software, vol. 93C, no. 3, pp. 44 46, March 2016.[https://www.sciencedirect.com/science/article/pii/S0965997815300120]
[J-7] K. Loukhaoukha, A. Refaey, K. Zebbiche, and M. Nabti, "On the Security of
Robust Image Watermarking Algorithm based on Discrete Wavelet Transform,
Discrete Cosine Transform and Singular Value Decomposition," Applied Mathematics & Information Sciences, vol. 9, no. 3, pp. 1159 1166, May 2015. [http://www.naturalspublishing.com/files/published/r4fhfg2389gd77.pdf]
[J-6] Ahmed Refaey, Weikun Hou, and Khaled Loukhaoukha, "Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes," Journal of Computer and Communications, Vol.2, pp. 64-75, May 2014 (Impact Factor:1.26). [https://m.scirp.org/papers/47316]
[J-5] Weikun Hou, Xianbin Wang, Jean-Yves Chouinard, and Ahmed Refaey "Physical Layer Authentication for Wireless Systems with Time-Varying Carrier Frequency Offsets," IEEE Transactions On Communications, Vol. 62, Issue 5, pp. 1658 - 1667, Feb. 2014. [https://ieeexplore.ieee.org/document/6804410]
[J-4] Jiazi Liu, Ahmed Refaey, XianbinWang, and Helen Tang "Reliability Enhancement for CIR-Based Physical Layer Authentication," Journal of Security and Communication Networks (Willy), Vol. 8, Issue 4, pp. 661-671, May 2014. [https://onlinelibrary.wiley.com/doi/full/10.1002/sec.1014]
[J-3] Ahmed Refaey, Khaled Loukhaoukha, and Mohamed Haj-taieb "Non-Cryptography Authentication for Wireless Communications based on two Uncorrelated Attributes," International Journal of Computer and Internet Security (IJCIS), Vol. 5, No. 2. pp. 19-29, 2013. [http://www.irphouse.com/ijcis/ijcisv5n1_03.pdf]
[J-2]Ahmed Refaey and Weikun Hou, "Flexible Decoder Based on MAP-Algorithm for Two Different Families of Codes," Journal of Electronics and Communication Engineering Research (JECER), Vol.1, Issue 4, pp. 01-14, 2013. [https://www.questjournals.org/jecer/papers/vol1-issue4/A140114.pdf]
[J-1] M. Amr Mokhtar and Ahmed Refaey, "DC-Free Turbo Coding Scheme For GPRS System and Bluetooth System," World Scientific and Engineering Academy and Society Transaction on Communications, Issue 6, Vol. 5, PP. 1238., June 2006.
[C-30] Emanuel Figetakis, and Ahmed Refaey "UAV Path Planning Using on-Board Ultrasound Transducer Arrays and Edge Support," Accepted in IEEE International Conference on Communications (ICC) WS, 2021.
[C-29] Christopher DeSantis, and Ahmed Refaey, "MEC-Based Evacuation Planning Using Variance Fractal Dimension Trajectory for Speech Classification," Accepted in IEEE International Conference on Communications (ICC) WS, 2021
[C-28] Angelo Rivera, Ahmed Refaey, and Ekram Hossain "Blockchain-Based Collaborative Task Offloading in MEC: A Hyperledger Fabric Framework," Accepted in IEEE International Conference on Communications (ICC) WS, 2021.
[C-27] Yahuza Bello, MHD Saria, Ahmed Refaey, Aiman Erbad, Amr Mohamed, and Nabil Abdennadher "B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core," Accepted in IEEE International Conference on Communications (ICC) WS, 2021.
[C-26] L. Basyouni, A. Erbad, A. Mohamed, Ahmed Refaey, and Mohsen Gizuini "Proportionally Fair approach for Tor’s Circuits Scheduling," 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 2020, pp. 1-6, doi: 10.1109/ISNCC49221.2020.9297310. [https://ieeexplore.ieee.org/document/9297310]
[C-25] H. R. Chi, M. F. Domingues, Ahmed Refaey, and A. Radwan, "Energy-Efficient and QoS-Improved D2D Small Cell Deployment for Smart Grid," GLOBECOM 2020 - 2020 IEEE Global Communications Conference, Taipei, Taiwan, 2020, pp. 1-6, doi: 10.1109/GLOBECOM42002.2020.9322108. [https://ieeexplore.ieee.org/document/9322108]
[C-24] Zain Khaliq, Paul Mirdita, Ahmed Refaey, and Xianbin Wang, “Unsupervised Manifold Alignment for Wifi RSSI Indoor Localization,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-7, doi: 10.1109/CCECE47787.2020.9255684.[https://ieeexplore.ieee.org/document/9255684]
[C-23] Jaspreet Singh, Marwan Dhuheir, Ahmed Refaey, Aiman Erbad, Amr Mohamed, and Mohsen Guizani, “Navigation and Obstacle Avoidance System in Unknown Environment,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-4, doi: 10.1109/CCECE47787.2020.9255754.[https://ieeexplore.ieee.org/document/9255754]
[C-22] Sumaia Atiwa, Yunus Dawji, Ahmed Refaey, and Sebastian Magierowski, “Accelerated Hardware Implementation of BLAKE2 Cryptographic Hash for Blockchain,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-6, doi: 10.1109/CCECE47787.2020.9255709.[https://ieeexplore.ieee.org/document/9255709]
[C-21] Sara Zimmo, Ahmed Refaey, and Abdallah Shami, “Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-2, doi: 10.1109/CCECE47787.2020.9255703.[https://ieeexplore.ieee.org/document/9255703]
[C-20] Radwa Sultan, Ahmed Refaey, and Walaa Hamouda, “Resource Allocation in CAT-M and LTE-A Coexistence: A Joint Contention Bandwidth Optimization Scheme,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-6, doi: 10.1109/CCECE47787.2020.9255823.[https://ieeexplore.ieee.org/document/9255823]
[C-19] Yaser Al Mtawa, Harsimranjit Singh, Anwar Haque, and Ahmed Refaey, “Smart Home Networks: Security Perspective and ML-based DDoS Detection,” 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), London, ON, Canada, 2020, pp. 1-8, doi: 10.1109/CCECE47787.2020.9255756.[https://ieeexplore.ieee.org/document/9255756]
[C-18] A Sallam, Ahmed Refaey, A Shami, “Securing Smart Home Networks with Software-Defined Perimeter” 15th International Wireless Communications & Mobile Computing (IWCMC), Tangier, Morocco, 2019, pp. 1989-1993, doi: 10.1109/IWCMC.2019.8766686.[https://ieeexplore.ieee.org/abstract/document/8766686]
[C-17] Palash Kumar, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami, and Juanita Koilpillai, “Performance Analysis of SDP For Secure Internal Enterprises,” IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 2019, pp. 1-6, doi: 10.1109/WCNC.2019.8885784.[https://ieeexplore.ieee.org/abstract/document/8885784]
[C-16] Sara Zimmo, Abdallah Moubayed, Ahmed Refaey, and Abdallah Shami, “Coexistence of WiFi and LTE in the Unlicensed Band using Time-Domain Virtualization,” IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6, doi: 10.1109/GLOCOM.2018.8648057.[https://ieeexplore.ieee.org/abstract/document/8648057]
[C-15] Robinson Mittmann, Sebastian Magierowski, Ahmed Refaey, and Ebrahim Ghafar-Zadeh “A High-Speed Embedded Event Detector for Mobile DNA Sequencing,” IEEE Life Sciences Conference (LSC), Montreal, QC, 2018, pp. 299-302, doi: 10.1109/LSC.2018.8572143.[https://ieeexplore.ieee.org/abstract/document/8572143]
[C-14] Elena Uchiteleva, Ahmed Refaey, and Abdallah Shami “Time-Varying Key for Encryption in WSNs,” IEEE Communications and Network Security (IEEE CNS), Oct. 2017.
[C-13] Ahmed Refaey, and Khaled Loukhaoukha “Cryptanalysis of Stream Cipher Using Density Evolution,” IEEE Communications and Network Security (IEEE CNS), Oct. 2017.
[C-12] Lisa Boneta, Ahmed Shalaby, Ahmed Refaey, Khaled Loukhaoukha, and George Giakos “3D Simultaneous Segmentation and Registration of Vertebral Bodies for Accurate BMD Measurements,” IEEE IST, Oct 2017.
[C-11] Jason Falbo, Ahmed Refaey, Raveendra Rao, and Khaled Loukhaoukha “IOT: Advanced Physical Signaling Methods for Power Line Networking Systems,” IEEE Canadian Conference on Electrical Computer Engineering, May 2017.
[C-10] Ahmed Refaey, Raheleh Niati, Xianbin Wang, and Jean-Yves Chouinard “Blind Detection Approach for LDPC, Convolutional, and Turbo Codes in Non-noisy Environment,” IEEE Communications and Network Security (IEEE CNS), Oct. 2014.
[C-9] Fuad Shamieh, Ahmed Refaey, and Xianbin Wang “An Adaptive Compression Technique Based on Real-Time RTT Feedback,” IEEE Canadian Conference on Electrical and Computer Engineering, May 2014.
[C-8] Ahmed Refaey, Sebastien Roy, Isabelle Laroche, and Benoit Gosselin “Exploration of Locally-Connected Viterbi Decoder Architectures Targeting LDPC and Convolutional Codes,” Asilomar Conference on Signal, Systems
andComputers, Nov. 2013.
[C-7] Weikun Hou, Xianbin Wang, and Ahmed Refaey “Secure OFDM Transmission Based on Multiple Relay Selection and Cooperation,” Proceedings of IEEE GLOBECOM 2013.
[C-6] Weikun Hou, Xianbin Wang, and Ahmed Refaey “Misbehavior Detection in Amplify-and-Forward Cooperative OFDM Systems,” IEEE International Conference on Communications (ICC) 2013.
[C-5] Peng Hao, X. Wang, and Ahmed Refaey, “An Enhanced Cross-Layer Authentication Mechanism for Wireless Communications Based on PER and RSSI,” Canadian Workshop for Information Theory, 2013.
[C-4] Ahmed Refaey, Sebastien Roy, and Paul Fortier “A New Approach for
ForwardError Correcting Decoding Based on the BP Algorithm in LTE and WiMAX Systems,” 11th Canadian Workshop on Information Theory (CWIT), May. 2011.
[C-3] Ahmed Refaey, Sebastien Roy, and Paul Fortier “On the Application of BP Decoding to Convolutional and Turbo Codes,” Asilomar Conference on Signal, Systems and Computers, Pacific Grove, CA, Nov. 1-4, 2009.
[C-2] Ahmed Refaey, J.Yves Chouinard, Sébastien Roy, Paul Fortier “A Comparison between BP, Log-Likelihood and Max Log-Likelihood Decoding Algorithms of LDPC Codes Based on EXIT Chart and EXIT Trajectories Methods,” International Conference on Advanced Technologies for Communications, Vietnam, October 6-9, 2008.
[C-1] Ahmed Refaey, M. Amr Mokhtar, Paul Fortier “Optimized DC-Free turbo coding scheme under the map decoding algorithm,” IEEE Canadian Conference on Electrical and Computer Engineering, May 2008.
[BC-1] Mohamad Kalil, Khalim A. Meerja, Ahmed Refaey, and Abdallah Shami, "Virtual Mobile Networks in Clouds," Book name: Advances in Mobile Cloud Computing Systems. PP 165-208., CRC Press (Taylor& Francis Group) Dec. 2014.
Honors, Awards, and Grants
- Sample of Recent Grants:
- Mitacs - Accelerate program: Title: Blockchain-Enabled Access Control in CPS 2021-2022.
- Waverley Labs Fund- Subcontract number, Department of Homeland Security-ICE Program: S&T Directorate, 2020-2021.
- International Research Collaboration - Qatar Research Foundation
Title: Designing Secure and Trustworthy Internet of Things (IoT) Systems, 2019-2021.
- NYC Media Lab / Havas - Future of Transportation in Cities
Title: Fusion of Airborne and Terrestrial Sensed Data for Real-time Monitoring, 2019.
- IEEE London Section, Computer Chapter Outstanding Engineer Award, 2018.
- Mitacs-Accélération Québec - Programme de Stages de Recherche, 2014 (Declined).
- Award for the successful defense of the thesis project before the end of the 10th calendar session, Université Laval, Quebec, Canada, 2011.