Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Permanent URI for this collectionhttps://hdl.handle.net/11147/7148

Browse

Search Results

Now showing 1 - 2 of 2
  • Article
    Citation - WoS: 2
    Semantic Communications in 6G: Coexistence, Multiple Access, and Satellite Networks
    (IEEE-Inst Electrical Electronics Engineers Inc, 2025) Ahmed, Ishtiaque; Sun, Yingzhuo; Fu, Jingwen; Kose, Alper; Musavian, Leila; Xiao, Ming; Ozbek, Berna
    The exponential growth of wireless users and bandwidth constraints necessitates innovative communication paradigms for next-generation networks. Semantic Communication (SemCom) emerges as a promising solution by transmitting extracted meaning rather than raw bits, enhancing spectral efficiency and enabling intelligent resource allocation. This paper explores the integration of SemCom with conventional Bit-based Communication (BitCom) in heterogeneous networks, highlighting key challenges and opportunities. We analyze multiple access techniques, including Non-Orthogonal Multiple Access (NOMA), to support coexisting SemCom and BitCom users. Furthermore, we examine multi-modal SemCom frameworks for handling diverse data types and discuss their applications in satellite networks, where semantic techniques mitigate bandwidth limitations and harsh channel conditions. Finally, we identify future directions for deploying semantic-aware systems in 6G and beyond.
  • Conference Object
    User Selection for Secure Massive Mimo Based Mobile Edge Computing With Delay-Sensitive Applications
    (IEEE, 2025) Yilmaz, Saadet Simay; Ozbek, Berna
    Mobile edge computing (MEC) has been a promising technology that leverages cloud computing capabilities at the network edge to address compute-intensive and delay-sensitive applications of mobile users with limited resources. Employing massive multiple-input multiple-output (mMIMO) and nonorthogonal multiple access (NOMA) in the MEC system facilitates simultaneous task offloading for multiple users, resulting in increased spectral efficiency and decreased offloading delay. Despite the great potential of the mMIMO-NOMA-based MEC system, offloading computation tasks to MEC servers can introduce inherent security concerns and vulnerabilities. We address a notable gap in the existing literature by investigating the effect of user selection to minimize the delay in MEC while enhancing the security of this framework. Specifically, this paper presents a user selection strategy for an uplink mMIMO-NOMA-based secure MEC system in the presence of a malicious eavesdropper (Eve) to minimize offloading and computing delays, subject to the transmit power, computing resource, and secrecy rate constraints with remote computing. We propose a two-step secure user selection algorithm and solve the optimization problem with the active-set algorithm. The simulation results demonstrate the effectiveness of the proposed user selection strategy on secure MEC with a malicious Eve by minimizing the task execution delay compared to the benchmark schemes.