{"id":"https://openalex.org/W7139110569","doi":"https://doi.org/10.1109/globecom59602.2025.11431665","title":"Secure Semantic Image Transmission over Wiretap Channels","display_name":"Secure Semantic Image Transmission over Wiretap Channels","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7139110569","doi":"https://doi.org/10.1109/globecom59602.2025.11431665"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11431665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431665","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129876374","display_name":"Xue Han","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xue Han","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002016154","display_name":"Biqian Feng","orcid":"https://orcid.org/0000-0001-7397-3629"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biqian Feng","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101902977","display_name":"Yue Wu","orcid":"https://orcid.org/0000-0002-1929-4067"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongpeng Wu","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130110829","display_name":"Xiang-Gen Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiang-Gen Xia","raw_affiliation_strings":["University of Delaware,Department of Electrical and Computer Engineering,Newark,DE,USA,19716"],"affiliations":[{"raw_affiliation_string":"University of Delaware,Department of Electrical and Computer Engineering,Newark,DE,USA,19716","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129858679","display_name":"Wenjun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Electronic Engineering,China,200240","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5129876374"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.65715967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3013","last_page":"3018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5770000219345093,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5770000219345093,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.17560000717639923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.03660000115633011,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6331999897956848},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6144999861717224},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5914999842643738},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5302000045776367},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5295000076293945},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.38199999928474426},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.3781999945640564},{"id":"https://openalex.org/keywords/convex-optimization","display_name":"Convex optimization","score":0.3736000061035156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685699999332428},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6331999897956848},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6144999861717224},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5914999842643738},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5302000045776367},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5295000076293945},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40540000796318054},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.38199999928474426},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.3781999945640564},{"id":"https://openalex.org/C157972887","wikidata":"https://www.wikidata.org/wiki/Q463359","display_name":"Convex optimization","level":3,"score":0.3736000061035156},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3727000057697296},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.3578999936580658},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3495999872684479},{"id":"https://openalex.org/C141379421","wikidata":"https://www.wikidata.org/wiki/Q6094427","display_name":"Iterative reconstruction","level":2,"score":0.34850001335144043},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.32710000872612},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3264000117778778},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.31630000472068787},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.30469998717308044},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30230000615119934},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2922999858856201},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2702000141143799},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11431665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11431665","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320307110","display_name":"Delta","ror":"https://ror.org/03g9c1e75"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2225156818","https://openalex.org/W2784709112","https://openalex.org/W2950680381","https://openalex.org/W2962967525","https://openalex.org/W3206371790","https://openalex.org/W3213872105","https://openalex.org/W4317350116","https://openalex.org/W4366957333","https://openalex.org/W4372348936","https://openalex.org/W4376467180","https://openalex.org/W4387870828","https://openalex.org/W4402129406","https://openalex.org/W4402156277","https://openalex.org/W4404037613","https://openalex.org/W4405908585","https://openalex.org/W4406311236"],"related_works":[],"abstract_inverted_index":{"Existing":[0],"semantic":[1,27,46,59,76],"communications":[2],"have":[3],"exhibited":[4],"satisfactory":[5],"performance":[6],"in":[7,82],"many":[8],"tasks,":[9],"but":[10],"secure":[11,26,90],"image":[12,28,40,91,124,131],"transmission":[13,29,41],"has":[14],"not":[15],"been":[16],"adequately":[17],"investigated.":[18],"In":[19],"this":[20],"paper,":[21],"we":[22,94],"propose":[23,95],"a":[24,44,55,75],"novel":[25],"(SSIT)":[30],"framework":[31],"over":[32],"multiple-input":[33],"single-output":[34],"(MISO)":[35],"wiretap":[36],"channels.":[37],"To":[38],"enhance":[39],"security":[42],"for":[43],"legitimate":[45,135],"user":[47],"(SU)":[48],"while":[49,128],"interfering":[50],"with":[51],"the":[52,89,104,113,134],"eavesdropper":[53],"(Eve),":[54],"type":[56],"of":[57],"beneficial":[58],"noise":[60],"map,":[61],"which":[62],"is":[63,72],"determined":[64],"by":[65,74],"both":[66],"source":[67],"and":[68,102],"SU":[69],"channel":[70],"states,":[71],"produced":[73],"noise-aided":[77],"conditional":[78],"variational":[79],"autoencoder":[80],"(SN-CVAE)":[81],"an":[83,96],"unsupervised":[84],"manner.":[85],"Furthermore,":[86],"to":[87,111],"improve":[88],"reconstruction":[92,132],"quality,":[93],"efficient":[97],"transmit":[98],"beamformer":[99],"optimization":[100,114],"algorithm":[101],"leverage":[103],"constrained":[105],"stochastic":[106],"successive":[107],"convex":[108],"approximation":[109],"(CSSCA)":[110],"solve":[112],"problem.":[115],"Numerical":[116],"results":[117],"demonstrate":[118],"that":[119],"our":[120],"method":[121],"effectively":[122],"protects":[123],"information":[125],"from":[126],"eavesdroppers":[127],"ensuring":[129],"high-fidelity":[130],"at":[133],"receiver.":[136]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-20T00:00:00"}
