On the privacy and security for e-health services in the metaverse: An overview
Metaverse-enabled healthcare systems are expected to efficiently utilize an unprecedented
amount of health-related data without disclosing sensitive or private information of …
amount of health-related data without disclosing sensitive or private information of …
ISAC from the sky: UAV trajectory design for joint communication and target localization
Integrated sensing and communication (ISAC) is studied in the airborne domain, where
Unmanned Aerial Vehicles (UAVs) act as communication base stations and radars …
Unmanned Aerial Vehicles (UAVs) act as communication base stations and radars …
Digital healthcare in the metaverse: Insights into privacy and security
In this article, metaverse healthcare systems are studied from the privacy and security
perspectives. We address data communication security for the metaverse, and the privacy …
perspectives. We address data communication security for the metaverse, and the privacy …
A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems
Physical layer-based secret key generation (PHY-SKG) schemes have attracted significant
attention in recent years due to their lightweight implementation and ability to achieve …
attention in recent years due to their lightweight implementation and ability to achieve …
Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain
V Ahsani, A Rahimi, M Letafati, BH Khalaj - ar** (FH) architecture can effectively resist
wiretap** and electromagnetic interference, but its wide hop** bandwidth will raise a …
wiretap** and electromagnetic interference, but its wide hop** bandwidth will raise a …
Secure deep-JSCC against multiple eavesdroppers
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-
JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) …
JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) …
Learning-based secret key generation in relay channels under adversarial attacks
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for
securing the sixth generation (6G) wireless networks thanks to its inherently lightweight …
securing the sixth generation (6G) wireless networks thanks to its inherently lightweight …