{"title":"基于互信息估计的深度学习窃听编码","authors":"Rick Fritschek, R. Schaefer, G. Wunder","doi":"10.1145/3395352.3402654","DOIUrl":null,"url":null,"abstract":"Recently, deep learning of encoding and decoding functions for wireless communication has emerged as a promising research direction and gained considerable interest due to its impressive results. A specific direction in this growing field are neural network-aided techniques that work without a fixed channel model. These approaches utilize generative adversarial networks, reinforcement learning, or mutual information estimation to overcome the need of a known channel model for training. This paper focuses on the last approach and extend it to secure channel coding schemes by sampling the legitimate channel and additionally introduce security constraints for communication. This results in a mixed optimization between the mutual information estimate, the reliability of the code and its secrecy constraint. It is believed that this lays the foundation for flexible, generalizable physical layer security approaches due to its independence of specific model assumptions.","PeriodicalId":370816,"journal":{"name":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Deep learning based wiretap coding via mutual information estimation\",\"authors\":\"Rick Fritschek, R. Schaefer, G. Wunder\",\"doi\":\"10.1145/3395352.3402654\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, deep learning of encoding and decoding functions for wireless communication has emerged as a promising research direction and gained considerable interest due to its impressive results. A specific direction in this growing field are neural network-aided techniques that work without a fixed channel model. These approaches utilize generative adversarial networks, reinforcement learning, or mutual information estimation to overcome the need of a known channel model for training. This paper focuses on the last approach and extend it to secure channel coding schemes by sampling the legitimate channel and additionally introduce security constraints for communication. This results in a mixed optimization between the mutual information estimate, the reliability of the code and its secrecy constraint. It is believed that this lays the foundation for flexible, generalizable physical layer security approaches due to its independence of specific model assumptions.\",\"PeriodicalId\":370816,\"journal\":{\"name\":\"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3395352.3402654\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3395352.3402654","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deep learning based wiretap coding via mutual information estimation
Recently, deep learning of encoding and decoding functions for wireless communication has emerged as a promising research direction and gained considerable interest due to its impressive results. A specific direction in this growing field are neural network-aided techniques that work without a fixed channel model. These approaches utilize generative adversarial networks, reinforcement learning, or mutual information estimation to overcome the need of a known channel model for training. This paper focuses on the last approach and extend it to secure channel coding schemes by sampling the legitimate channel and additionally introduce security constraints for communication. This results in a mixed optimization between the mutual information estimate, the reliability of the code and its secrecy constraint. It is believed that this lays the foundation for flexible, generalizable physical layer security approaches due to its independence of specific model assumptions.