{"id":"https://openalex.org/W7123370684","doi":"https://doi.org/10.1109/access.2026.3652482","title":"Digital Twin and Transformer-Based Learning for Secure and Energy-Efficient Active RIS-Assisted Communications","display_name":"Digital Twin and Transformer-Based Learning for Secure and Energy-Efficient Active RIS-Assisted Communications","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123370684","doi":"https://doi.org/10.1109/access.2026.3652482"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3652482","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652482","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3652482","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061574941","display_name":"Akram Y. Sarhan","orcid":"https://orcid.org/0000-0002-1522-562X"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Akram Y. Sarhan","raw_affiliation_strings":["Department of Information Technology, College of Computing and Information Technology, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computing and Information Technology, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122881248","display_name":"Osamah A. Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128557","display_name":"Ministry of Higher Education and Scientific Research","ror":"https://ror.org/03m5ehy13","country_code":"IQ","type":"government","lineage":["https://openalex.org/I4210128557"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Osamah A. Abdullah","raw_affiliation_strings":["Ministry of Higher Education and Scientific Research, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Ministry of Higher Education and Scientific Research, Baghdad, Iraq","institution_ids":["https://openalex.org/I4210128557"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122116620","display_name":"Khalid T. Musri","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khalid T. Mursi","raw_affiliation_strings":["Department of Cybersecurity, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041497097","display_name":"Hayder Al-Hraishawi","orcid":"https://orcid.org/0000-0002-0977-9984"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hayder Al-Hraishawi","raw_affiliation_strings":["Department of Electrical Engineering, University of South Florida, Tampa, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of South Florida, Tampa, FL, USA","institution_ids":["https://openalex.org/I2613432"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061574941"],"corresponding_institution_ids":["https://openalex.org/I4210099699"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08196606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"8060","last_page":"8077"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.8119999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.8119999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.1582999974489212,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7682999968528748},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6029999852180481},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5473999977111816},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5070000290870667},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.49050000309944153},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.478300005197525},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.39910000562667847},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.3901999890804291}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485000133514404},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7682999968528748},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6029999852180481},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5896000266075134},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5473999977111816},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5070000290870667},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.49050000309944153},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.39910000562667847},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3901999890804291},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.387800008058548},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.38510000705718994},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34950000047683716},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.32910001277923584},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.289000004529953},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C180611318","wikidata":"https://www.wikidata.org/wiki/Q7316902","display_name":"Retransmission","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3652482","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652482","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3652482","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3652482","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8846359252929688,"display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G29497948","display_name":null,"funder_award_id":"MoE-IF-UJ-R2-22-4100335-3","funder_id":"https://openalex.org/F4320327296","funder_display_name":"Ministry of Education \u2013 Kingdom of Saudi Arabi"}],"funders":[{"id":"https://openalex.org/F4320327296","display_name":"Ministry of Education \u2013 Kingdom of Saudi Arabi","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W975194921","https://openalex.org/W2125240595","https://openalex.org/W2734764337","https://openalex.org/W2969424089","https://openalex.org/W2979826702","https://openalex.org/W2981876784","https://openalex.org/W2984937369","https://openalex.org/W3027118737","https://openalex.org/W3043220753","https://openalex.org/W3099989708","https://openalex.org/W3117031041","https://openalex.org/W3135614874","https://openalex.org/W3157217691","https://openalex.org/W3212580602","https://openalex.org/W3213510032","https://openalex.org/W4280573907","https://openalex.org/W4297030626","https://openalex.org/W4312318390","https://openalex.org/W4328027388","https://openalex.org/W4378194960","https://openalex.org/W4381327854","https://openalex.org/W4385245566","https://openalex.org/W4386275752","https://openalex.org/W4390044158","https://openalex.org/W4391164246","https://openalex.org/W4400447325","https://openalex.org/W4402158960","https://openalex.org/W4404035585","https://openalex.org/W4405599668","https://openalex.org/W4406112142","https://openalex.org/W4408087658","https://openalex.org/W4410371049","https://openalex.org/W4410428528","https://openalex.org/W4410949848","https://openalex.org/W4412444685","https://openalex.org/W4412536456","https://openalex.org/W4413120653","https://openalex.org/W4415797031","https://openalex.org/W7117877244"],"related_works":[],"abstract_inverted_index":{"Ensuring":[0],"secure":[1],"and":[2,32,99,117,126,160,182,191,200,227],"energy-efficient":[3],"connectivity":[4],"in":[5,78,173,179,231],"wireless":[6,233],"networks":[7],"aided":[8],"by":[9],"a":[10,22,49,86,170,176,183],"low-altitude":[11],"autonomous":[12],"aerial":[13],"vehicle":[14],"(AAV)-mounted":[15],"active":[16],"reconfigurable":[17],"intelligent":[18],"surface":[19],"(ARIS)":[20],"is":[21,110,132],"major":[23],"challenge,":[24],"owing":[25],"to":[26,40,94,112,169,223],"rapid":[27],"channel":[28,124],"variations,":[29],"mobility-induced":[30],"uncertainty,":[31],"the":[33,195,202,205,213],"heightened":[34],"risk":[35],"of":[36,197,204,215],"adversarial":[37,127],"eavesdropping":[38],"inherent":[39],"open-air":[41],"communication.":[42],"To":[43],"address":[44],"these":[45],"challenges,":[46],"we":[47],"propose":[48],"digital":[50],"twin":[51],"(DT)-empowered":[52],"Transformer-based":[53,87,220],"policy":[54,139,153],"learning":[55,136,222],"framework":[56,166,206],"that":[57],"combines":[58],"accurate":[59],"real-time":[60],"virtual":[61],"modeling":[62],"with":[63,75,137,207,219],"attention-driven":[64],"sequential":[65],"decision-making":[66],"for":[67],"AAV\u2013ARIS-assisted":[68],"communications.":[69],"The":[70,129,164],"DT":[71,217],"enables":[72],"efficient":[73],"synchronization":[74],"physical":[76],"channels":[77],"dynamic":[79],"environments,":[80],"significantly":[81],"improving":[82],"data-efficient":[83],"training.":[84],"Meanwhile,":[85],"actor\u2013critic":[88],"architecture":[89],"captures":[90],"long-range":[91],"temporal":[92],"dependencies":[93],"jointly":[95],"optimize":[96],"ARIS":[97],"configuration":[98],"AAV":[100],"mobility":[101],"control":[102],"across":[103],"diverse":[104],"scenarios.":[105],"A":[106],"multi-objective":[107],"reward":[108],"function":[109],"formulated":[111,130],"maximize":[113],"both":[114],"secrecy":[115,174],"rate":[116],"energy":[118,180],"efficiency":[119],"while":[120],"ensuring":[121],"robustness":[122],"against":[123],"uncertainty":[125],"threats.":[128],"problem":[131],"solved":[133],"using":[134],"reinforcement":[135,221],"Transformer-enhanced":[138],"optimization.":[140],"Simulation":[141],"results":[142],"demonstrate":[143,201],"consistent":[144],"performance":[145],"gains":[146],"over":[147],"strong":[148],"baselines,":[149],"including":[150],"DT-deep":[151],"deterministic":[152],"gradient":[154],"(DDPG),":[155],"DT-twin":[156],"delayed":[157],"DDPG":[158],"(TD3),":[159],"RIS-soft":[161],"actor-critic":[162],"(SAC).":[163],"proposed":[165],"achieves":[167],"up":[168],"12.5%":[171],"improvement":[172],"rate,":[175],"14.8%":[177],"enhancement":[178],"efficiency,":[181],"33%":[184],"faster":[185],"convergence":[186],"rate.":[187],"Furthermore,":[188],"ablation":[189],"studies":[190],"complexity":[192],"analyses":[193],"confirm":[194],"contribution":[196],"each":[198],"component":[199],"scalability":[203],"acceptable":[208],"latency.":[209],"These":[210],"findings":[211],"highlight":[212],"potential":[214],"integrating":[216],"technology":[218],"enable":[224],"secure,":[225],"adaptive,":[226],"resource-efficient":[228],"ARIS-assisted":[229],"communications":[230],"next-generation":[232],"networks.":[234]},"counts_by_year":[],"updated_date":"2026-04-16T15:07:20.185449","created_date":"2026-01-14T00:00:00"}
