Assistant Professor, Electrical & Computer Engineering
Ph.D., Université Laval, QC, Canada.
M.Sc., Alexandria University, Alexandria, Egypt.
B.Sc., Alexandria University, Alexandria, Egypt.
ECE 727 - Computer Networks
ECEG 520 - Computer Architecture
ECEG 721 - Embedded Systems
EECE 522 - Mobile Communication Networks
EECE 232 - Computer Organization
EECE 420-421 - Capstone Projects
- Adaptive Communication Systems and Networks Security
- IoT/Emerging Communications/Computing Technologies and Applications
- Embedded Systems/FPGA Prototypes Implementation
Publications and Scholarly Activities
[P-1] Xianbin Wang and Ahmed Refaey, “System, Apparatus, and Methodology for Asymmetrical Transceiver in Short Range High-Speed Wireless Communications” US Patent office, # 20140177753 A1. Granted, Canadian Patent Office, App. # 2,837,272.
[P-2] Ahmed Refaey, Khaled Loukhaoukha, and Gamal Refai-Ahmed, “Video/Audio Wireless Broadcasting Distribution Using Multi Ranges WiFi Access Points” Patent Application,
WiCastingCanada, Canadian Patent Office, App. # 2,916,469.
[P-3] Ahmed Refaey and Gamal Refai-Ahmed, “Movement Monitoring System using Wireless Access Points for Healthcare Applications,” Patent Application, Canadian Patent Office, 2018 App. # 2,919,096.
[P-3] Ahmed Refaey and Gamal Refai-Ahmed, “Network Security Flow Control Using Machine Learning,” Patent Application, Canadian Patent Office, 2018 App. # ---.
[J-29] Jaspreet Singh, Yahuza Bello, and Ahmed Refaey, and Amr Mohamed "Hierarchical Security Paradigm for IoT Multi-access Edge Computing," IEEE IoT Journal, Accepted in Oct. 2020.[https://ieeexplore.ieee.org/document/9237982]
[J-28] F. Shamieh, X. Wang and Ahmed Refaey, “Transaction Throughput Provisioning Technique for Blockchain-based Industrial IoT Networks,” IEEE Transactions on Network Science and Engineering, Accepted in Aug 2020. doi: 10.1109/TNSE.2020.3017389. [https://ieeexplore.ieee.org/document/9171591]
[J-27] Jaspreet Singh, Ahmed Refaey, and Juanita Koilpillai "Adoption of the Software-Defined Perimeter Architecture for Infrastructure as a Service," IEEE-CJECE, Vol. 43, no. 4, pp. 357-363, Fall 2020. [https://ieeexplore.ieee.org/document/9240082?source=authoralert].
[J-26] A. Rivera, Ahmed Refaey, and E. Hossain, "A blockchain framework for secure task-sharing in multi-access edge computing," IEEE Network, Accepted in Aug 2020. to appear. [https://ieeexplore.ieee.org/document/9210139]
[J-25] A. Feriani, Ahmed Refaey, and E. Hossain, "Tracking pandemics: A MEC-enabled IoT ecosystem with learning capability," IEEE IoT Magazine, Special Issue on "Smart IoT Solutions for Combating the COVID-19 Pandemic," vol. 3, no. 3, pp. 40-45, September 2020.[https://ieeexplore.ieee.org/document/9241470]
[J-24] Jaspreet Singh, Ahmed Refaey, and Abdallah Shami" On the Security of NFV: A Completed Secure and Scalable Framework Using the Software-defined Perimeter," Accepted- IEEE Networks, Mar. 2020. [https://ieeexplore.ieee.org/abstract/document/8826550]
[J-23] A. Abdellatif, A. Al-Marridi, A. Mohamed, A. Erbad, and Ahmed Refaey, "SSHealth: Toward Secure, Blockchain-enabled Healthcare Systems" Accepted- IEEE Networks, Mar. 2020. [https://ieeexplore.ieee.org/abstract/document/9076126]
[J-22] Elena Uchiteleva, Ahmed Refaey, and Abdallah Shami "Lightweight Dynamic Re-Keying Algorithm for Encryption in Low Power WSNs," IEEE IoT Journal, vol. 7, no. 6, pp. 4972-4986, June 2020. [https://ieeexplore.ieee.org/abstract/document/9001126]
[J-21] Min Li, Helen Tang, Ahmed Refaey, and Xianbin Wang "A Sidechain-based Decentralized Authentication Scheme via Optimized Two-way Peg Protocol for Smart Community," IEEE ComSoc Journal, vol. 1, pp. 282-292, Feb. 2020. [https://ieeexplore.ieee.org/document/9013015]
[J-20] Ahmed Refaey, Karim Hammad, Sebastian Magrawaski, and Ekram Hossain " A Blockchain Policy and Charging Control Framework for MNOs," IEEE Networks, Accepted, Oct. 2019. [https://ieeexplore.ieee.org/abstract/document/8910631]
[J-19] Ahmed Refaey, Ahmed Sallam, and Abdallah Shami, "On IoT Applications: a Proposed SDP Framework for MQTT," Accepted IET Letter, August 2019. [https://ieeexplore.ieee.org/document/8930455]
[J-18] Ahmed Sallam, Ahmed Refaey, and Abdallah Shami, " On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-defined Perimeter," IEEE Access, Accepted, August 2019. [https://ieeexplore.ieee.org/abstract/document/8826550]
[J-17] Abdallah Moubayed, Ahmed Refaey, and Abdallah Shami, " Software Defined Perimeter: State of the Art Secure Solution for Modern Networks," IEEE Network, Accepted Feb 2019 [https://ieeexplore.ieee.org/abstract/document/8863736]
[J-16] N. Mehallegue, K. Loukhaoukha, K. Zebbiche, Ahmed Refaey, and M. Djellab "Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted image," Springer Journal of Multimedia Tools and Applications, issn 1573-7721, Nov. 2018. [https://link.springer.com/article/10.1007/s11042-019-08271-z]
[J-15]Mohamad Kalil, A. Al-Dweik, Abdallah Shami, and A. Refaey "A Framework for Joint Wireless Network Virtualization and Cloud Radio Access Networks for Next Generation Wireless Networks," IEEE Access, Volume: PP, Issue: 99, Aug 2017. [https://ieeexplore.ieee.org/abstract/document/8022863]
[J-14] Khaled Alhazmi, Abdallah Shami, and Ahmed Refaey, "Optimized Provisioning of SDN-enabled Virtual Networks in Geo-distributed Cloud Computing Datacenters" Journal of Communications and Networks (IEEE), Volume: 19, Issue: 4, August 2017. [https://ieeexplore.ieee.org/abstract/document/8036663]
[J-13] K. Loukhaoukha, A. Refaey, K. Zebbiche, and A. Shami, "Efficient and secure cryptosystem for fingerprint images in the wavelet domain," Multimedia Tools and Applications, In Press by Springer, Available online 22 June 2017 (Impact factor: 1.541). [https://link.springer.com/article/10.1007/s11042-017-4938-9]
[J-12] Elena Uchiteleva, Abdallah Shami, and Ahmed Refaey "Virtualization of Wireless Sensor Networks: Throughput- and Time-Based Resource Scheduling," IEEE Journal of Sensor Networks, vol. 17, no. 5, pp. 1562-1576, Mar. 2017 (Impact factor: 2.617). [https://ieeexplore.ieee.org/abstract/document/7795235]
[J-11] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Ambiguity attacks on robust
blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," Journal of Electrical Systems and Information Technology, In Press by Elsevier, January 2017. [https://www.sciencedirect.com/science/article/pii/S2314717216301179]
[J-10] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Comments on "Homomorphic image watermarking with a singular value decomposition algorithm"," Information Processing & Management, vol. 52, no. 4, pp. 644 645, July 2016, (Impact Factor: 1.397).
[J-9] Khalim A. Meerja, Abdallah Shami, and Ahmed Refaey, "Hailing cloud empowered radio access networks," Magazine in Wireless Communications, IEEE, vol.22, no.1, pp.122-129, February 2015.
[J-8] K. Loukhaoukha, A. Refaey, and K. Zebbiche, "Comments "On a Robust Color Image Watermarking with Singular Value Decomposition Method"," Advances in Engineering Software, vol. 93C, no. 3, pp. 44 46, March 2016, (Impact Factor: 1.673).
[J-7] K. Loukhaoukha, A. Refaey, K. Zebbiche, and M. Nabti, "On the Security of
Robust Image Watermarking Algorithm based on Discrete Wavelet Transform,
Discrete Cosine Transform and Singular Value Decomposition," Applied Mathematics & Information Sciences, vol. 9, no. 3, pp. 1159 1166, May 2015, (Impact Factor: 1.232).
[J-6] Ahmed Refaey, Weikun Hou, and Khaled Loukhaoukha, "Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes," Journal of Computer and Communications, Vol.2, pp. 64-75, May 2014 (Impact Factor:1.26).
[J-5] Weikun Hou, Xianbin Wang, Jean-Yves Chouinard, and Ahmed Refaey "Physical Layer Authentication for Wireless Systems with Time-Varying Carrier Frequency Offsets," IEEE Transactions On Communications, Vol. 62, Issue 5, pp. 1658 - 1667, Feb. 2014 (Impact Factor: 4.058).
[J-4] Jiazi Liu, Ahmed Refaey, XianbinWang, and Helen Tang "Reliability Enhancement for CIR-Based Physical Layer Authentication," Journal of Security and Communication Networks (Willy), Vol. 8, Issue 4, pp. 661-671, May 2014 (Impact factor:1.067).
[J-3] Ahmed Refaey, Khaled Loukhaoukha, and Mohamed Haj-taieb "Non-Cryptography Authentication for Wireless Communications based on two Uncorrelated Attributes," International Journal of Computer and Internet Security (IJCIS), Vol. 5, No. 2. pp. 19-29, 2013.
[J-2]Ahmed Refaey and Weikun Hou, "Flexible Decoder Based on MAP-Algorithm for Two Different Families of Codes," Journal of Electronics and Communication Engineering Research (JECER), Vol.1, Issue 4, pp. 01-14, 2013.
[J-1] M. Amr Mokhtar and Ahmed Refaey, "DC-Free Turbo Coding Scheme For GPRS System and Bluetooth System," World Scientific and Engineering Academy and Society Transaction on Communications, Issue 6, Vol. 5, PP. 1238., June 2006.
[C-18] Ahmed Sallam, Ahmed Refaey, and Abdallah Shami, "Securing Smart Home Networks with Software-defined Perimeter," IEEE IWCMC, April 2019-Accepted.
[C-17]Abdallah Moubayed, Ahmed Refaey, and Abdallah Shami, " Performance Analysis of SDP For Secure Internal Enterprises," IEEE WCNC, Sept. 2018-Accepted.
[C-16] Sara Zimmo, Ahmed Refaey, and Abdallah Shami “Coexistence of WiFi and LTE in the Unlicensed Band using Time-Domain Virtualization,” IEEE GLOBECOM, Dec. 2018 - Accepted
[C-15] Robinson Mittmann, Sebastian Magierowski, Ahmed Refaey, and Ebrahim Ghafar-Zadeh “A High-Speed Embedded Event Detector for Mobile DNA Sequencing,” IEEE Life Sciences, Aug. 2018 – Accepted.
[C-14] Elena Uchiteleva, Ahmed Refaey, and Abdallah Shami “Time-Varying Key for Encryption in WSNs,” IEEE Communications and Network Security (IEEE CNS), Oct. 2017.
[C-13] Ahmed Refaey, and Khaled Loukhaoukha “Cryptanalysis of Stream Cipher Using Density Evolution,” IEEE Communications and Network Security (IEEE CNS), Oct. 2017.
[C-12] Lisa Boneta, Ahmed Shalaby, Ahmed Refaey, Khaled Loukhaoukha, and George Giakos “3D Simultaneous Segmentation and Registration of Vertebral Bodies for Accurate BMD Measurements,” IEEE IST, Oct 2017.
[C-11] Jason Falbo, Ahmed Refaey, Raveendra Rao, and Khaled Loukhaoukha “IOT: Advanced Physical Signaling Methods for Power Line Networking Systems,” IEEE Canadian Conference on Electrical Computer Engineering, May 2017.
[C-10] Ahmed Refaey, Raheleh Niati, Xianbin Wang, and Jean-Yves Chouinard “Blind Detection Approach for LDPC, Convolutional, and Turbo Codes in Non-noisy Environment,” IEEE Communications and Network Security (IEEE CNS), Oct. 2014.
[C-9] Fuad Shamieh, Ahmed Refaey, and Xianbin Wang “An Adaptive Compression Technique Based on Real-Time RTT Feedback,” IEEE Canadian Conference on Electrical and Computer Engineering, May 2014.
[C-8] Ahmed Refaey, Sebastien Roy, Isabelle Laroche, and Benoit Gosselin “Exploration of Locally-Connected Viterbi Decoder Architectures Targeting LDPC and Convolutional Codes,” Asilomar Conference on Signal, Systems
andComputers, Nov. 2013.
[C-7] Weikun Hou, Xianbin Wang, and Ahmed Refaey “Secure OFDM Transmission Based on Multiple Relay Selection and Cooperation,” Proceedings of IEEE GLOBECOM 2013.
[C-6] Weikun Hou, Xianbin Wang, and Ahmed Refaey “Misbehavior Detection in Amplify-and-Forward Cooperative OFDM Systems,” IEEE International Conference on Communications (ICC) 2013.
[C-5] Peng Hao, X. Wang, and Ahmed Refaey, “An Enhanced Cross-Layer Authentication Mechanism for Wireless Communications Based on PER and RSSI,” Canadian Workshop for Information Theory, 2013.
[C-4] Ahmed Refaey, Sebastien Roy, and Paul Fortier “A New Approach for
ForwardError Correcting Decoding Based on the BP Algorithm in LTE and WiMAX Systems,” 11th Canadian Workshop on Information Theory (CWIT), May. 2011.
[C-3] Ahmed Refaey, Sebastien Roy, and Paul Fortier “On the Application of BP Decoding to Convolutional and Turbo Codes,” Asilomar Conference on Signal, Systems and Computers, Pacific Grove, CA, Nov. 1-4, 2009.
[C-2] Ahmed Refaey, J.Yves Chouinard, Sébastien Roy, Paul Fortier “A Comparison between BP, Log-Likelihood and Max Log-Likelihood Decoding Algorithms of LDPC Codes Based on EXIT Chart and EXIT Trajectories Methods,” International Conference on Advanced Technologies for Communications, Vietnam, October 6-9, 2008.
[C-1] Ahmed Refaey, M. Amr Mokhtar, Paul Fortier “Optimized DC-Free turbo coding scheme under the map decoding algorithm,” IEEE Canadian Conference on Electrical and Computer Engineering, May 2008.
[BC-1] Mohamad Kalil, Khalim A. Meerja, Ahmed Refaey, and Abdallah Shami, "Virtual Mobile Networks in Clouds," Book name: Advances in Mobile Cloud Computing Systems. PP 165-208., CRC Press (Taylor& Francis Group) Dec. 2014.
Honors, Awards, and Grants
- IEEE London Section, Computer Chapter Outstanding Engineer Award, 2018.
- Mitacs-Accélération Québec - Programme de Stages de Recherche, 2014 (Declined).
- Award for the successful defense of the thesis project before the end of the 10th calendar session, Université Laval, Quebec, Canada, 2011.