On the privacy and security for e-health services in the metaverse: An overview

M Letafati, S Otoum - Ad Hoc Networks, 2023 - Elsevier
Metaverse-enabled healthcare systems are expected to efficiently utilize an unprecedented
amount of health-related data without disclosing sensitive or private information of …

ISAC from the sky: UAV trajectory design for joint communication and target localization

X **g, F Liu, C Masouros… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Integrated sensing and communication (ISAC) is studied in the airborne domain, where
Unmanned Aerial Vehicles (UAVs) act as communication base stations and radars …

Digital healthcare in the metaverse: Insights into privacy and security

M Letafati, S Otoum - IEEE Consumer Electronics Magazine, 2023 - ieeexplore.ieee.org
In this article, metaverse healthcare systems are studied from the privacy and security
perspectives. We address data communication security for the metaverse, and the privacy …

A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems

H Luo, N Garg, T Ratnarajah - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Physical layer-based secret key generation (PHY-SKG) schemes have attracted significant
attention in recent years due to their lightweight implementation and ability to achieve …

Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain

V Ahsani, A Rahimi, M Letafati, BH Khalaj - ar** (FH) architecture can effectively resist
wiretap** and electromagnetic interference, but its wide hop** bandwidth will raise a …

Secure deep-JSCC against multiple eavesdroppers

SAA Kalkhoran, M Letafati, E Erdemir… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-
JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) …

Learning-based secret key generation in relay channels under adversarial attacks

M Letafati, H Behroozi, BH Khalaj… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for
securing the sixth generation (6G) wireless networks thanks to its inherently lightweight …