{"title":"Secure Semantic Communication via Paired Adversarial Residual Networks","authors":"Boxiang He;Fanggang Wang;Tony Q. S. Quek","doi":"10.1109/LWC.2024.3448474","DOIUrl":null,"url":null,"abstract":"This letter explores the positive side of the adversarial attack for the security-aware semantic communication system. Specifically, a pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver. The module at the transmitter uses a trainable adversarial residual network (ARN) to generate adversarial examples, while the module at the receiver employs another trainable ARN to remove the adversarial attack and the channel noise. To mitigate the threat of the semantic eavesdropping, the trainable ARNs are jointly optimized to minimize the weighted sum of the power of adversarial attacks, the mean squared error of the semantic communication, and the confidence of the eavesdropper correctly retrieving the private information. Numerical results show that our scheme can fool the eavesdropper while maintaining the high-quality semantic communication.","PeriodicalId":13343,"journal":{"name":"IEEE Wireless Communications Letters","volume":"13 10","pages":"2832-2836"},"PeriodicalIF":5.5000,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Wireless Communications Letters","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10644121/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This letter explores the positive side of the adversarial attack for the security-aware semantic communication system. Specifically, a pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver. The module at the transmitter uses a trainable adversarial residual network (ARN) to generate adversarial examples, while the module at the receiver employs another trainable ARN to remove the adversarial attack and the channel noise. To mitigate the threat of the semantic eavesdropping, the trainable ARNs are jointly optimized to minimize the weighted sum of the power of adversarial attacks, the mean squared error of the semantic communication, and the confidence of the eavesdropper correctly retrieving the private information. Numerical results show that our scheme can fool the eavesdropper while maintaining the high-quality semantic communication.
期刊介绍:
IEEE Wireless Communications Letters publishes short papers in a rapid publication cycle on advances in the state-of-the-art of wireless communications. Both theoretical contributions (including new techniques, concepts, and analyses) and practical contributions (including system experiments and prototypes, and new applications) are encouraged. This journal focuses on the physical layer and the link layer of wireless communication systems.