Secure Semantic Communication via Paired Adversarial Residual Networks

被引:0
|
作者
He, Boxiang [1 ]
Wang, Fanggang [1 ]
Quek, Tony Q. S. [2 ]
机构
[1] Beijing Jiaotong Univ, Frontiers Sci Ctr Smart High Speed Railway Syst, Sch Elect & Informat Engn, State Key Lab Adv Rail Autonomous Operat, Beijing 100044, Peoples R China
[2] Singapore Univ Technol & Design, Informat Syst Technol & Design, Cluny Rd, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Semantics; Receivers; Transmitters; Communication systems; Security; Residual neural networks; Deep learning; Adversarial attack; residual network; secure semantic communication;
D O I
10.1109/LWC.2024.3448474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter explores the positive side of the adversarial attack for the security-aware semantic communication system. Specifically, a pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver. The module at the transmitter uses a trainable adversarial residual network (ARN) to generate adversarial examples, while the module at the receiver employs another trainable ARN to remove the adversarial attack and the channel noise. To mitigate the threat of the semantic eavesdropping, the trainable ARNs are jointly optimized to minimize the weighted sum of the power of adversarial attacks, the mean squared error of the semantic communication, and the confidence of the eavesdropper correctly retrieving the private information. Numerical results show that our scheme can fool the eavesdropper while maintaining the high-quality semantic communication.
引用
收藏
页码:2832 / 2836
页数:5
相关论文
共 50 条
  • [41] Secure communication via quantum illumination
    Jeffrey H. Shapiro
    Zheshen Zhang
    Franco N. C. Wong
    Quantum Information Processing, 2014, 13 : 2171 - 2193
  • [42] Defending Adversarial Attacks via Semantic Feature Manipulation
    Wang, Shuo
    Nepal, Surya
    Rudolph, Carsten
    Grobler, Marthie
    Chen, Shangyu
    Chen, Tianle
    An, Zike
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3184 - 3197
  • [43] UNTARGETED ADVERSARIAL ATTACK VIA EXPANDING THE SEMANTIC GAP
    Wu, Aming
    Han, Yahong
    Zhang, Quanxin
    Kuang, Xiaohui
    2019 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2019, : 514 - 519
  • [44] Secure communication system via hyperchaos
    Yu, S.M.
    Qiu, S.S.
    Dianbo Kexue Xuebao/Chinese Journal of Radio Science, 2001, 16 (02):
  • [45] A secure and efficient communication resume protocol for secure wireless networks
    Kim, K
    Hong, J
    Lim, J
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, 2005, 3543 : 157 - 168
  • [46] Secure communication via quantum illumination
    Shapiro, Jeffrey H.
    Zhang, Zheshen
    Wong, Franco N. C.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (10) : 2171 - 2193
  • [47] Translation-aware semantic segmentation via conditional least-square generative adversarial networks
    Zhang, Mi
    Hu, Xiangyun
    Zhao, Like
    Pang, Shiyan
    Gong, Jinqi
    Luo, Min
    JOURNAL OF APPLIED REMOTE SENSING, 2017, 11
  • [48] Unsupervised Domain Adaptation With Adversarial Residual Transform Networks
    Cai, Guanyu
    Wang, Yuqin
    He, Lianghua
    Zhou, MengChu
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (08) : 3073 - 3086
  • [49] Secure communication in IP-based wireless sensor networks via a trusted gateway
    Van den Abeele, Floris
    Vandewinckele, Tom
    Hoebeke, Jeroen
    Moerman, Ingrid
    Demeester, Piet
    2015 IEEE TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP), 2015,
  • [50] Secure Communication in Complex Dynamical Networks via Time-Delayed Feedback Control
    Park, M. J.
    Lee, S. H.
    Kaviarasan, B.
    Kwon, O. M.
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1116 - 1125