- A. Alarood, M. Faheem, M. A. Al-Khasawneh, A. I. A. Alzahrani and A. A. Alshdadi, “Secure medical image transmission using deep neural network in e-health applications,” Healthcare Technology Letters, pp. 87-98, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
- Chorti et al., “Context-Aware Security for 6G Wireless: The Role of Physical Layer Security,” IEEE Communications Standards Magazine, vol. 6, no. 1, pp. 102-108, 2022, doi: 10.1109/MCOMSTD.0001.2000082.
- Han, L. Sun, and Q. Du, “Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation,” in 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), 15-18 May 2016 2016, pp. 1-5, doi: 10.1109/VTCSpring.2016.7504468.
- Jiang, H. Zhang, Y. Ren, Z. Han, K. C. Chen, and L. Hanzo, “Machine Learning Paradigms for Next-Generation Wireless Networks,” IEEE Wireless Communications, vol. 24, no. 2, pp. 98-105, 2017, doi: 10.1109/MWC.2016.1500356WC.
- Impedovo, . G. Pirlo and . G. Pirlo, “A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission,” applied sciences, pp. 1-19, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
- Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, “Exploiting Fountain Codes for Secure Wireless Delivery,” IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, 2014, doi: 10.1109/LCOMM.2014.030914.140030.
- Mucchi et al., “How 6G Technology Can Change the Future Wireless Healthcare,” in 2020 2nd 6G Wireless Summit (6G SUMMIT), 17-20 March 2020 2020, pp. 1-6, doi: 10.1109/6GSUMMIT49458.2020.9083916.
- Sun and H. Xu, “Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback,” IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, 2019, doi: 10.1109/TVT.2018.28858
- Sun, D. Huang, and A. L. Swindlehurst, “Fountain-Coding Aided Secure Transmission With Delay and Content Awareness,” IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7992-7997, 2020, doi: 10.1109/TVT.2020.2992619.
- Sun, P. Ren, Q. Du, and Y. Wang, “Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, 2016, doi: 10.1109/TII.2015.250944
- ES-SABRY, N. EL AKKAD, M. MERRAS, K. SATORI, W. EL-SHAFAI, T. ALTAMEEM and M. M. FOUDA, “Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques,” IEEE Access, vol. 11, pp. 100856-10878, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
- Letafati, A. Kuhestani, and H. Behroozi, “Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2856-2868, 2020, doi: 10.1109/TIFS.2020.2978627.
- Letafati, A. Kuhestani, D. W. K. Ng, and H. Behroozi, “A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay,” in 2020 IEEE International Conference on Communications Workshops (ICC Workshops), 7-11 June 2020 2020, pp. 1-7, doi: 10.1109/ICCWorkshops49005.2020.9145441.
- Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, “Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6771-6785, 2020, doi: 10.1109/TWC.2020.3006012.
- Letafati, A. Kuhestani, K. K. Wong, and M. J. Piran, “A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 2021, doi: 10.1109/JIOT.2020.3026475.
- Letafati, H. Behroozi, B. H. Khalaj, and E. A. Jorswieck, “Content-Based Medical Image Transmission Against Randomly-Distributed Passive Eavesdroppers,” in 2021 IEEE International Conference on Communications Workshops (ICC Workshops), 14-23 June 2021 2021, pp. 1-7, doi: 10.1109/ICCWorkshops50388.2021.9473492.
- B. Baker, W. Xiang, and I. Atkinson, “Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities,” IEEE Access, vol. 5, pp. 26521-26544, 2017, doi: 10.1109/ACCESS.2017.2775180
- Khan and I. Chatzigeorgiou, “Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication,” IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 223-234, 2018, doi: 10.1109/TWC.2017.2764891.
- Y. Lu and L. D. Xu, “Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics,” IEEE Internet of Things Journal, 6, no. 2, pp. 2103-2115, 2019, doi: 10.1109/JIOT.2018.2869847.
- Wang and W. Qiu, “Secure Image Transmission over DFT-precoded OFDM-VLC systems based on Chebyshev Chaos scrambling,” Optics Communications, vol. 397, pp. 84-90, 2017/08/15/ 2017, doi: https://doi.org/10.1016/j.optcom.2017.03.076.
|