default search action
Mehdi Letafati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Mehdi Letafati, Safa Otoum:
Digital Healthcare in the Metaverse: Insights into Privacy and Security. IEEE Consumer Electron. Mag. 13(3): 80-89 (2024) - [j9]Mohammad Javad Sojdeh, Mehdi Letafati, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj:
Secure multi-server coded caching. Comput. Networks 253: 110715 (2024) - [j8]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Diffusion Model-Aided Data Reconstruction in Cell-Free Massive MIMO Downlink: A Computation-Aware Approach. IEEE Wirel. Commun. Lett. 13(11): 3162-3166 (2024) - [c10]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Denoising Diffusion Probabilistic Models for Hardware-Impaired Communications. WCNC 2024: 1-6 - 2023
- [j7]Mehdi Letafati, Safa Otoum:
On the privacy and security for e-health services in the metaverse: An overview. Ad Hoc Networks 150: 103262 (2023) - [c9]Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz:
Secure Deep-JSCC Against Multiple Eavesdroppers. GLOBECOM 2023: 3433-3438 - [c8]Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj:
A Novel Metaverse-as-a-Service Architecture from an Operator View. MetaCom 2023: 209-216 - [i11]Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj:
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain. CoRR abs/2301.01221 (2023) - [i10]Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz:
Secure Deep-JSCC Against Multiple Eavesdroppers. CoRR abs/2308.02892 (2023) - [i9]Mehdi Letafati, Safa Otoum:
Digital Healthcare in The Metaverse: Insights into Privacy and Security. CoRR abs/2308.04438 (2023) - [i8]Mehdi Letafati, Safa Otoum:
Global Differential Privacy for Distributed Metaverse Healthcare Systems. CoRR abs/2308.04439 (2023) - [i7]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Denoising Diffusion Probabilistic Models for Hardware-Impaired Communications. CoRR abs/2309.08568 (2023) - [i6]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Probabilistic Constellation Shaping With Denoising Diffusion Probabilistic Models: A Novel Approach. CoRR abs/2309.08688 (2023) - [i5]Mehdi Letafati, Samad Ali, Matti Latva-aho:
WiGenAI: The Symphony of Wireless and Generative AI via Diffusion Models. CoRR abs/2310.07312 (2023) - [i4]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Denoising Diffusion Probabilistic Models for Hardware-Impaired Communication Systems: Towards Wireless Generative AI. CoRR abs/2310.19460 (2023) - [i3]Mehdi Letafati, Samad Ali, Matti Latva-aho:
Generative AI-Based Probabilistic Constellation Shaping With Diffusion Models. CoRR abs/2311.09349 (2023) - 2022
- [j6]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers. IEEE Trans. Commun. 70(2): 1125-1139 (2022) - [j5]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries. IEEE Wirel. Commun. Lett. 11(4): 856-860 (2022) - [c7]Mohammad Javad Sojdeh, Mohammad Mahmoudi, Mehdi Letafati, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj:
Secure Multi-Antenna Coded Caching. SPAWC 2022: 1-5 - [c6]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Wireless-Powered Cooperative Key Generation for e-Health: A Reservoir Learning Approach. VTC Spring 2022: 1-7 - [i2]Mohammad Javad Sojdeh, Mehdi Letafati, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj:
Multi-Transmitter Coded Caching with Secure Delivery over Linear Networks - Extended Version. CoRR abs/2211.14672 (2022) - 2021
- [j4]Mehdi Letafati, Ali Kuhestani, Kai-Kit Wong, Md. Jalil Piran:
A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer. IEEE Internet Things J. 8(6): 4373-4388 (2021) - [j3]Hamed Bastami, Mehdi Letafati, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Lajos Hanzo:
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks. IEEE Trans. Inf. Forensics Secur. 16: 5018-5033 (2021) - [c5]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. GLOBECOM 2021: 1-6 - [c4]Hamed Bastami, Majid Moradikia, Mehdi Letafati, Ahmed Abdelhadi, Hamid Behroozi:
Outage-Constrained Robust and Secure Design for Downlink Rate-Splitting UAV Networks. ICC Workshops 2021: 1-7 - [c3]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Content-Based Medical Image Transmission Against Randomly-Distributed Passive Eavesdroppers. ICC Workshops 2021: 1-7 - [i1]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers - Extended Version. CoRR abs/2104.09326 (2021) - 2020
- [j2]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. IEEE Trans. Inf. Forensics Secur. 15: 2856-2868 (2020) - [j1]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi, Derrick Wing Kwan Ng:
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay. IEEE Trans. Wirel. Commun. 19(10): 6771-6785 (2020) - [c2]Mehdi Letafati, Ali Kuhestani, Derrick Wing Kwan Ng, Mohammad Reza Ahmadi Beshkani:
Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications. GLOBECOM 2020: 1-6 - [c1]Mehdi Letafati, Ali Kuhestani, Derrick Wing Kwan Ng, Hamid Behroozi:
A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay. ICC Workshops 2020: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint