Picture for Ahmed Abdelhadi

Ahmed Abdelhadi

Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey

Add code
Feb 15, 2024
Figure 1 for Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey
Figure 2 for Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey
Figure 3 for Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey
Figure 4 for Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey
Viaarxiv icon

Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

Add code
Sep 26, 2022
Figure 1 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 2 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 3 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 4 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Viaarxiv icon

Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks

Add code
May 29, 2022
Figure 1 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 2 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 3 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 4 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Viaarxiv icon

A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning

Add code
May 01, 2022
Figure 1 for A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning
Figure 2 for A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning
Figure 3 for A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning
Figure 4 for A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning
Viaarxiv icon

Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

Add code
Jan 07, 2021
Figure 1 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 2 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 3 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 4 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Viaarxiv icon