default search action
Mohammad M. Mansour
- > Home > Persons > Mohammad M. Mansour
Publications
- 2020
- [j49]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
Physical layer security schemes for MIMO systems: an overview. Wirel. Networks 26(3): 2089-2111 (2020) - [c53]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
A Lightweight Reconfigurable RRAM-based PUF for Highly Secure Applications. DFT 2020: 1-4 - 2019
- [j48]Basma Hajri, Hassen Aziza, Mohammad M. Mansour, Ali Chehab:
RRAM Device Models: A Comparative Analysis With Experimental Validation. IEEE Access 7: 168963-168980 (2019) - [j47]Hassan N. Noura, Reem Melki, Mohammad M. Mansour, Ali Chehab:
Design and realization of efficient & secure multi-homed systems based on random linear network coding. Comput. Networks 163 (2019) - [j46]Hassan Noura, Christophe Guyeux, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 29(5): 1950059:1-1950059:24 (2019) - [j45]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach. IEEE Internet Things J. 6(1): 361-378 (2019) - [j44]Hassan N. Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mob. Networks Appl. 24(2): 447-463 (2019) - [j43]Hassan N. Noura, Mohamad Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient and secure cipher scheme for multimedia contents. Multim. Tools Appl. 78(11): 14837-14866 (2019) - [j42]Hassan Noura, Ali Chehab, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
Lightweight, dynamic and efficient image encryption scheme. Multim. Tools Appl. 78(12): 16527-16561 (2019) - [j41]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
A survey on OFDM physical layer security. Phys. Commun. 32: 1-30 (2019) - 2018
- [j39]Asmaa Abdallah, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
When Quantized Massive MIMO Meets Large MIMO With Higher Order Modulation. IEEE Commun. Lett. 22(12): 2599-2602 (2018) - [j38]Hassen Aziza, Basma Hajri, Mohammad M. Mansour, Ali Chehab, Annie Pérez:
A lightweight write-assist scheme for reduced RRAM variability and power. Microelectron. Reliab. 88-90: 6-10 (2018) - [j37]Hassan Noura, Lama Sleem, Mohamad Noura, Mohammad M. Mansour, Ali Chehab, Raphaël Couturier:
A new efficient lightweight and secure image cipher scheme. Multim. Tools Appl. 77(12): 15457-15484 (2018) - [j36]Hassan Noura, Ali Chehab, Lama Sleem, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
One round cipher algorithm for multimedia IoT devices. Multim. Tools Appl. 77(14): 18383-18413 (2018) - [j35]Mohamad Noura, Hassan Noura, Ali Chehab, Mohammad M. Mansour, Lama Sleem, Raphaël Couturier:
A dynamic approach for a lightweight and secure cipher for medical images. Multim. Tools Appl. 77(23): 31397-31426 (2018) - [j34]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis. IEEE Trans. Commun. 66(6): 2421-2436 (2018) - [j33]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Power Control and Channel Allocation for D2D Underlaid Cellular Networks. IEEE Trans. Commun. 66(7): 3217-3234 (2018) - [j32]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
High Order Multi-User MIMO Subspace Detection. J. Signal Process. Syst. 90(3): 305-321 (2018) - [c48]Jean Abou Rahal, Bassel Maamari, Basma Hajri, Rouwaida Kanj, Mohammad M. Mansour, Ali Chehab:
Low power GDI ALU design with mixed logic adder functionality. ICICDT 2018: 9-12 - [c47]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
Memristor models optimization for large-scale 1T1R memory arrays. ICICDT 2018: 109-112 - [c46]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Channel-Punctured Large MIMO Detection. ISIT 2018: 2147-2151 - [c45]Hassan Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour, Steven Martin:
Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices. IWCMC 2018: 1267-1272 - [c44]Mohamad Noura, Hassan N. Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
S-DES: An efficient & secure DES variant. MENACOMM 2018: 1-6 - [c43]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab, Louay M. A. Jalloul:
MMSE Detection for 1-Bit Quantized Massive MIMO with Imperfect Channel Estimation. SPAWC 2018: 1-5 - [c42]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Joint channel allocation and power control for D2D communications using stochastic geometry. WCNC 2018: 1-6 - [c41]Reem Melki, Mohammad M. Mansour, Ali Chehab:
A fairness-based congestion control algorithm for multipath TCP. WCNC 2018: 1-6 - [i10]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Power Control and Channel Allocation for D2D Underlaid Cellular Networks. CoRR abs/1803.00983 (2018) - 2017
- [j31]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Modulation Classification via Subspace Detection in MIMO Systems. IEEE Commun. Lett. 21(1): 64-67 (2017) - [c40]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
Oxide-based RRAM models for circuit designers: A comparative analysis. DTIS 2017: 1-6 - [c39]Saleh Usman, Mohammad M. Mansour, Ali Chehab:
A Multi-Gbps Fully Pipelined Layered Decoder for IEEE 802.11n/ac/ax LDPC Codes. ISVLSI 2017: 194-199 - [c38]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Hard-output chase detectors for large MIMO: BER performance and complexity analysis. PIMRC 2017: 1-5 - [c37]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
A Distance-Based Power Control Scheme for D2D Communications Using Stochastic Geometry. VTC Fall 2017: 1-6 - [i9]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Efficient Implementation of a Recognition System Using the Cortex Ventral Stream Model. CoRR abs/1711.07827 (2017) - [i8]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis. CoRR abs/1712.01877 (2017) - 2016
- [c36]Saleh Usman, Mohammad M. Mansour, Ali Chehab:
Interlaced Column-Row Message-Passing Schedule for Decoding LDPC Codes. GLOBECOM 2016: 1-6 - [c35]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Efficient subspace detection for high-order MIMO systems. ICASSP 2016: 1001-1005 - [c34]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Efficient near optimal joint modulation classification and detection for MU-MIMO systems. ICASSP 2016: 3706-3710 - [c32]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Efficient near-optimal 8×8 MIMO detector. WCNC 2016: 1-6 - [c31]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Low-complexity joint modulation classification and detection in MU-MIMO. WCNC 2016: 1-6 - [i6]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Modulation Classification via Subspace Detection in MIMO Systems. CoRR abs/1610.03362 (2016) - 2015
- [c30]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Likelihood-based modulation classification for MU-MIMO systems. GlobalSIP 2015: 873-877 - [c29]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Low-complexity MIMO detector with 1024-QAM. GlobalSIP 2015: 883-887 - [c26]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Efficient Implementation of a Recognition System using the Cortex Ventral Stream Model. VISAPP (2) 2015: 138-147 - [c25]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Algorithmic Optimizations in the HMAX Model Targeted for Efficient Object Recognition. VISIGRAPP (Selected Papers) 2015: 374-395 - 2014
- [j21]Mehiar Dabbagh, Hazem M. Hajj, Wassim El-Hajj, Mohammad M. Mansour, Ayman I. Kayssi, Ali Chehab:
An energy-aware design methodology based on kernel optimisations. Int. J. Auton. Adapt. Commun. Syst. 7(3): 271-294 (2014) - 2013
- [j14]Faisal Hamady, Ayman I. Kayssi, Ali Chehab, Mohammad M. Mansour:
Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors. J. Signal Process. Syst. 70(2): 193-208 (2013) - 2011
- [c19]Farah B. Yahya, Mohammad M. Mansour, Ali Chehab:
A novel technique to measure data retention voltage of large SRAM arrays. ISCAS 2011: 65-68 - [c18]Mehiar Dabbagh, Hazem M. Hajj, Ali Chehab, Wassim El-Hajj, Ayman I. Kayssi, Mohammad M. Mansour:
A design methodology for energy aware neural networks. IWCMC 2011: 1333-1340 - [c16]Ihab Nahlus, Lama Shaer, Ali Chehab, Ayman I. Kayssi, Mohammad M. Mansour:
Low-power adder design techniques for noise-tolerant applications. SiPS 2011: 117-121
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint