{"id":"https://openalex.org/W7133548122","doi":"https://doi.org/10.1109/jsac.2026.3670338","title":"DeepGuard: Defending Deep Joint Source-Channel Coding Against Eavesdropping at Physical-Layer","display_name":"DeepGuard: Defending Deep Joint Source-Channel Coding Against Eavesdropping at Physical-Layer","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133548122","doi":"https://doi.org/10.1109/jsac.2026.3670338"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2026.3670338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3670338","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kaiyi Chi","orcid":"https://orcid.org/0009-0003-6660-0463"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiyi Chi","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038230803","display_name":"Yinghui He","orcid":"https://orcid.org/0000-0002-5560-1327"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yinghui He","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128072116","display_name":"Qianqian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianqian Yang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121974534","display_name":"Yuanchao Shu","orcid":null},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanchao Shu","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhiqin Wang","orcid":"https://orcid.org/0000-0003-1700-3411"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqin Wang","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128104762","display_name":"Jun Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Luo","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55468307,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"44","issue":null,"first_page":"4128","last_page":"4143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9322999715805054,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9322999715805054,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.008100000210106373,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8402000069618225},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.7275999784469604},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5509999990463257},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3626999855041504},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.3151000142097473},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.29510000348091125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.864799976348877},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8402000069618225},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.7275999784469604},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5509999990463257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4449000060558319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3702999949455261},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3626999855041504},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.29510000348091125},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.2800000011920929},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.27959999442100525},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.2727000117301941},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2676999866962433},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.263700008392334},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25619998574256897},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2513999938964844}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jsac.2026.3670338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3670338","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/212240","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/212240","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.5032010674476624}],"awards":[{"id":"https://openalex.org/G3925505045","display_name":null,"funder_award_id":"2025C01012","funder_id":"https://openalex.org/F4320327780","funder_display_name":"Key Research and Development Program of Jiangxi Province"},{"id":"https://openalex.org/G6294039694","display_name":null,"funder_award_id":"92467301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6454029087","display_name":null,"funder_award_id":"62293481","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6903338179","display_name":null,"funder_award_id":"62571487","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327780","display_name":"Key Research and Development Program of Jiangxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2027515139","https://openalex.org/W2112796928","https://openalex.org/W2946889564","https://openalex.org/W2989885118","https://openalex.org/W3016114141","https://openalex.org/W3107617916","https://openalex.org/W3166791908","https://openalex.org/W3201394241","https://openalex.org/W3206371790","https://openalex.org/W3216777582","https://openalex.org/W4200630668","https://openalex.org/W4226042246","https://openalex.org/W4312051582","https://openalex.org/W4312539031","https://openalex.org/W4313270775","https://openalex.org/W4313350178","https://openalex.org/W4313350185","https://openalex.org/W4313350220","https://openalex.org/W4313455370","https://openalex.org/W4318586293","https://openalex.org/W4365420366","https://openalex.org/W4376467180","https://openalex.org/W4381748177","https://openalex.org/W4381785866","https://openalex.org/W4381785967","https://openalex.org/W4386025568","https://openalex.org/W4387870828","https://openalex.org/W4388937205","https://openalex.org/W4390357418","https://openalex.org/W4392152437","https://openalex.org/W4392158908","https://openalex.org/W4392397456","https://openalex.org/W4396712624","https://openalex.org/W4396909799","https://openalex.org/W4396918245","https://openalex.org/W4399426488","https://openalex.org/W4399619613","https://openalex.org/W4400409675","https://openalex.org/W4400579059","https://openalex.org/W4401509671","https://openalex.org/W4402039819","https://openalex.org/W4402129406","https://openalex.org/W4402302478","https://openalex.org/W4402897188","https://openalex.org/W4404178629","https://openalex.org/W4404628173","https://openalex.org/W4405351316","https://openalex.org/W4406611000","https://openalex.org/W4406858359","https://openalex.org/W4406858660","https://openalex.org/W4408164332","https://openalex.org/W4408749819","https://openalex.org/W4409014205","https://openalex.org/W4414158926"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"joint":[1],"source-channel":[2],"coding":[3],"(DeepJSCC)":[4],"has":[5],"emerged":[6],"as":[7,245,247],"a":[8,107,150,170],"promising":[9],"paradigm":[10],"for":[11,78,203,232],"efficient":[12],"and":[13,112,211,252],"robust":[14],"information":[15],"transmission.":[16],"However,":[17],"its":[18],"intrinsic":[19],"characteristics":[20],"also":[21],"pose":[22],"new":[23],"security":[24],"challenges,":[25],"notably":[26],"an":[27,189],"increased":[28],"vulnerability":[29],"to":[30,67,100,137,258],"eavesdropping":[31,38,81,94,197,226],"attacks.":[32],"Existing":[33],"studies":[34],"on":[35,177],"defending":[36],"against":[37,80,96],"attacks":[39,95,118,128],"in":[40,122,216,250],"DeepJSCC,":[41],"while":[42,199,228],"demonstrating":[43],"certain":[44],"effectiveness,":[45],"often":[46],"incur":[47],"considerable":[48],"computational":[49],"overhead":[50],"or":[51],"introduce":[52],"performance":[53,198,243,263],"trade-offs":[54],"that":[55,92,155,194,222],"may":[56],"adversely":[57],"affect":[58],"legitimate":[59,162,204,233,267],"users.":[60,205,234],"In":[61,235],"this":[62],"paper,":[63],"we":[64,105,167,187],"present":[65],"DeepGuard,":[66],"the":[68,73,140,157,174,178,182,240,262,266],"best":[69],"of":[70,117,173],"our":[71],"knowledge,":[72],"first":[74,168],"physical-layer":[75],"defense":[76],"framework":[77],"DeepJSCC":[79,97],"attacks,":[82],"validated":[83],"through":[84],"over-the-air":[85,131,214],"experiments":[86,215,220],"using":[87,209],"software-defined":[88],"radios":[89],"(SDRs).":[90],"Considering":[91],"existing":[93],"are":[98,129],"limited":[99],"simulation":[101],"under":[102,119,132],"ideal":[103],"channels,":[104],"take":[106],"step":[108],"further":[109],"by":[110,181,244,256,265],"identifying":[111],"implementing":[113],"four":[114],"representative":[115],"types":[116],"various":[120],"configurations":[121],"orthogonal":[123],"frequency-division":[124],"multiplexing":[125],"systems.":[126],"These":[127],"evaluated":[130],"diverse":[133],"scenarios,":[134],"allowing":[135],"us":[136],"comprehensively":[138],"characterize":[139],"real-world":[141],"threat":[142],"landscape.":[143],"To":[144,164],"mitigate":[145],"these":[146],"threats,":[147],"DeepGuard":[148,208,223,237],"introduces":[149],"novel":[151],"preamble":[152,158],"perturbation":[153,191],"mechanism":[154],"modifies":[156],"shared":[159],"only":[160],"between":[161],"transceivers.":[163],"realize":[165],"it,":[166],"conduct":[169,212],"theoretical":[171],"analysis":[172],"perturbation\u2019s":[175],"impact":[176],"signals":[179],"intercepted":[180],"eavesdropper.":[183],"Building":[184],"upon":[185],"this,":[186],"develop":[188],"end-to-end":[190],"optimization":[192],"algorithm":[193],"significantly":[195],"degrades":[196],"preserving":[200,229],"reliable":[201,230],"communication":[202,231],"We":[206],"prototype":[207],"SDRs":[210],"extensive":[213],"practical":[217],"scenarios.":[218],"Extensive":[219],"demonstrate":[221],"effectively":[224],"mitigates":[225],"threats":[227],"particular,":[236],"can":[238],"reduce":[239],"eavesdropper\u2019s":[241],"reconstruction":[242],"much":[246],"29":[248],"dB":[249],"PSNR":[251],"decrease":[253],"classification":[254],"accuracy":[255],"up":[257],"91%":[259],"compared":[260],"with":[261],"achieved":[264],"user.":[268]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-05T00:00:00"}
