Secure Semantic Communication via Paired Adversarial Residual Networks

被引:0
|
作者
He, Boxiang [1 ]
Wang, Fanggang [1 ]
Quek, Tony Q. S. [2 ]
机构
[1] Beijing Jiaotong Univ, Frontiers Sci Ctr Smart High Speed Railway Syst, Sch Elect & Informat Engn, State Key Lab Adv Rail Autonomous Operat, Beijing 100044, Peoples R China
[2] Singapore Univ Technol & Design, Informat Syst Technol & Design, Cluny Rd, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Semantics; Receivers; Transmitters; Communication systems; Security; Residual neural networks; Deep learning; Adversarial attack; residual network; secure semantic communication;
D O I
10.1109/LWC.2024.3448474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter explores the positive side of the adversarial attack for the security-aware semantic communication system. Specifically, a pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver. The module at the transmitter uses a trainable adversarial residual network (ARN) to generate adversarial examples, while the module at the receiver employs another trainable ARN to remove the adversarial attack and the channel noise. To mitigate the threat of the semantic eavesdropping, the trainable ARNs are jointly optimized to minimize the weighted sum of the power of adversarial attacks, the mean squared error of the semantic communication, and the confidence of the eavesdropper correctly retrieving the private information. Numerical results show that our scheme can fool the eavesdropper while maintaining the high-quality semantic communication.
引用
收藏
页码:2832 / 2836
页数:5
相关论文
共 50 条
  • [1] Is Semantic Communication Secure? A Tale of Multi-Domain Adversarial Attacks
    Sagduyu, Yalin E.
    Erpek, Tugba
    Ulukus, Sennur
    Yener, Aylin
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (11) : 50 - 55
  • [2] Reliable and Secure Communication over Adversarial Multipath Networks: A Survey
    Kadhe, Swanand
    Sprintson, Alex
    Zhang, Qiaosheng
    Bakshi, Mayank
    Jaggi, Sidharth
    2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [3] Exploration of Semantic Label Decomposition and Dataset Size in Semantic Indoor Scenes Synthesis via Optimized Residual Generative Adversarial Networks
    Ibrahem, Hatem
    Salem, Ahmed
    Kang, Hyun-Soo
    SENSORS, 2022, 22 (21)
  • [4] Secure communication scheme analysis via complex networks
    Ding, Yong
    Xiong, Ning
    He, En
    Li, Kezan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (24):
  • [5] ADVERSARIAL NETWORKS FOR SECURE WIRELESS COMMUNICATIONS
    Marchioro, Thomas
    Laurenti, Nicola
    Gunduz, Deniz
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 8748 - 8752
  • [6] Secure Transmission in Wireless Semantic Communications With Adversarial Training
    Shi, Jiting
    Zhang, Qianyun
    Zeng, Weihao
    Li, Shufeng
    Qin, Zhijin
    IEEE COMMUNICATIONS LETTERS, 2025, 29 (03) : 487 - 491
  • [7] Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori
    Seo, Junghaa
    Park, Sangwoo
    Kang, Joonhyuk
    ICT EXPRESS, 2022, 8 (02): : 220 - 224
  • [8] Remote Sensing Image Synthesis via Semantic Embedding Generative Adversarial Networks
    Wang, Chendan
    Chen, Bowen
    Zou, Zhengxia
    Shi, Zhenwei
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2023, 61
  • [9] Cross-domain Semantic Feature Learning via Adversarial Adaptation Networks
    Li, Rui
    Cao, Wenming
    Qian, Sheng
    Wong, Hau-San
    Wu, Si
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 37 - 42
  • [10] Semantic Image Synthesis via Conditional Cycle-Generative Adversarial Networks
    Liu, Xiyan
    Meng, Gaofeng
    Xiang, Shiming
    Pan, Chunhong
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 988 - 993