Search Results for author: Hesham Mohammed

Found 2 papers, 0 papers with code

Learning Secured Modulation With Deep Adversarial Neural Networks

no code implementations27 May 2020 Hesham Mohammed, Dola Saha

We propose an end-to-end symmetric key neural encryption and decryption algorithm with a modulation technique, which remains undeciphered by an eavesdropper, equipped with the same neural network and trained on the same dataset as the intended users.

Learning from Peers at the Wireless Edge

no code implementations30 Jan 2020 Shuvam Chakraborty, Hesham Mohammed, Dola Saha

The last mile connection is dominated by wireless links where heterogeneous nodes share the limited and already crowded electromagnetic spectrum.

Networking and Internet Architecture Signal Processing

Cannot find the paper you are looking for? You can Submit a new open access paper.