Mehdi Letafati

Orcid: 0000-0003-3731-3943

According to our database1, Mehdi Letafati authored at least 26 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital Healthcare in the Metaverse: Insights into Privacy and Security.
IEEE Consumer Electron. Mag., May, 2024

2023
On the privacy and security for e-health services in the metaverse: An overview.
Ad Hoc Networks, November, 2023

Generative AI-Based Probabilistic Constellation Shaping With Diffusion Models.
CoRR, 2023

Denoising Diffusion Probabilistic Models for Hardware-Impaired Communication Systems: Towards Wireless Generative AI.
CoRR, 2023

WiGenAI: The Symphony of Wireless and Generative AI via Diffusion Models.
CoRR, 2023

Probabilistic Constellation Shaping With Denoising Diffusion Probabilistic Models: A Novel Approach.
CoRR, 2023

Denoising Diffusion Probabilistic Models for Hardware-Impaired Communications.
CoRR, 2023

Global Differential Privacy for Distributed Metaverse Healthcare Systems.
CoRR, 2023

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain.
CoRR, 2023

A Novel Metaverse-as-a-Service Architecture from an Operator View.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Secure Deep-JSCC Against Multiple Eavesdroppers.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries.
IEEE Wirel. Commun. Lett., 2022

On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers.
IEEE Trans. Commun., 2022

Multi-Transmitter Coded Caching with Secure Delivery over Linear Networks - Extended Version.
CoRR, 2022

Wireless-Powered Cooperative Key Generation for e-Health: A Reservoir Learning Approach.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Secure Multi-Antenna Coded Caching.
Proceedings of the 23rd IEEE International Workshop on Signal Processing Advances in Wireless Communication, 2022

2021
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks.
IEEE Trans. Inf. Forensics Secur., 2021

A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer.
IEEE Internet Things J., 2021

On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers - Extended Version.
CoRR, 2021

Content-Based Medical Image Transmission Against Randomly-Distributed Passive Eavesdroppers.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Outage-Constrained Robust and Secure Design for Downlink Rate-Splitting UAV Networks.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay.
IEEE Trans. Wirel. Commun., 2020

Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2020

A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications.
Proceedings of the IEEE Global Communications Conference, 2020


  Loading...