Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay M Letafati, A Kuhestani, H Behroozi, DWK Ng IEEE Transactions on Wireless Communications 19 (10), 6771-6785, 2020 | 75 | 2020 |
On the privacy and security for e-health services in the metaverse: An overview M Letafati, S Otoum Ad Hoc Networks, 103262, 2023 | 61 | 2023 |
A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer M Letafati, A Kuhestani, KK Wong, MJ Piran IEEE Internet of Things Journal 8 (6), 4373-4388, 2020 | 59 | 2020 |
Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things M Letafati, A Kuhestani, H Behroozi IEEE Transactions on Information Forensics and Security 15, 2856-2868, 2020 | 40 | 2020 |
On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks H Bastami, M Letafati, M Moradikia, A Abdelhadi, H Behroozi, L Hanzo IEEE Transactions on Information Forensics and Security 16, 5018-5033, 2021 | 39 | 2021 |
A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay M Letafati, A Kuhestani, DWK Ng, H Behroozi 2020 IEEE International Conference on Communications Workshops (ICC …, 2020 | 32 | 2020 |
Hardware-impaired PHY secret key generation with man-in-the-middle adversaries M Letafati, H Behroozi, BH Khalaj, EA Jorswieck IEEE Wireless Communications Letters 11 (4), 856-860, 2022 | 31 | 2022 |
Digital healthcare in the metaverse: Insights into privacy and security M Letafati, S Otoum IEEE Consumer Electronics Magazine, 2023 | 28 | 2023 |
Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks M Letafati, H Behroozi, BH Khalaj, EA Jorswieck 2021 IEEE Global Communications Conference (GLOBECOM), 1-6, 2021 | 28 | 2021 |
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers M Letafati, H Behroozi, BH Khalaj, EA Jorswieck IEEE Transactions on Communications 70 (2), 1125-1139, 2021 | 25 | 2021 |
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain V Ahsani, A Rahimi, M Letafati, BH Khalaj arXiv preprint arXiv:2301.01221, 2023 | 22 | 2023 |
Physical layer secrecy and transmission resiliency of device-to-device communications M Letafati, A Kuhestani, DWK Ng, MRA Beshkani GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 17 | 2020 |
Wireless-Powered Cooperative Key Generation for e-Health: A Reservoir Learning Approach M Letafati, H Behroozi, BH Khalaj, EA Jorswieck 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring), 1-7, 2022 | 15 | 2022 |
Content-based medical image transmission against randomly-distributed passive eavesdroppers M Letafati, H Behroozi, BH Khalaj, EA Jorswieck 2021 IEEE International Conference on Communications Workshops (ICC …, 2021 | 15 | 2021 |
Generative AI-Based Probabilistic Constellation Shaping With Diffusion Models M Letafati, S Ali, M Latva-aho arXiv preprint arXiv:2311.09349, 2023 | 13* | 2023 |
Global differential privacy for distributed metaverse healthcare systems M Letafati, S Otoum 2023 International Conference on Intelligent Metaverse Technologies …, 2023 | 12 | 2023 |
Denoising diffusion probabilistic models for hardware-impaired communications M Letafati, S Ali, M Latva-aho 2024 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2024 | 11 | 2024 |
Secure deep-JSCC against multiple eavesdroppers SAA Kalkhoran, M Letafati, E Erdemir, BH Khalaj, H Behroozi, D Gündüz GLOBECOM 2023-2023 IEEE Global Communications Conference, 3433-3438, 2023 | 11 | 2023 |
Outage-constrained robust and secure design for downlink rate-splitting UAV networks H Bastami, M Moradikia, M Letafati, A Abdelhadi, H Behroozi 2021 IEEE International Conference on Communications Workshops (ICC …, 2021 | 6 | 2021 |
Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks M Letafati, H Behroozi, BH Khalaj, EA Jorswieck IEEE Open Journal of Vehicular Technology, 2023 | 5 | 2023 |