{"id":"https://openalex.org/W7125009999","doi":"https://doi.org/10.1109/lcomm.2026.3654956","title":"Adversarial Defense in Modulation Recognition via Diffusion and Segment-Wise Classification","display_name":"Adversarial Defense in Modulation Recognition via Diffusion and Segment-Wise Classification","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125009999","doi":"https://doi.org/10.1109/lcomm.2026.3654956"},"language":null,"primary_location":{"id":"doi:10.1109/lcomm.2026.3654956","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2026.3654956","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123441439","display_name":"Mingkun Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114105","display_name":"Tsinghua\u2013Berkeley Shenzhen Institute","ror":"https://ror.org/02hhwwz98","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114105","https://openalex.org/I95457486","https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingkun Li","raw_affiliation_strings":["Tsinghua Shenzhen International Graduate School, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Shenzhen International Graduate School, Shenzhen, China","institution_ids":["https://openalex.org/I4210114105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123450010","display_name":"Pengyu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengyu Wang","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123439250","display_name":"Yuhan Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114105","display_name":"Tsinghua\u2013Berkeley Shenzhen Institute","ror":"https://ror.org/02hhwwz98","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114105","https://openalex.org/I95457486","https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhan Dong","raw_affiliation_strings":["Tsinghua Shenzhen International Graduate School, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Shenzhen International Graduate School, Shenzhen, China","institution_ids":["https://openalex.org/I4210114105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122847304","display_name":"Jinshu Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Chen","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123399464","display_name":"Zhaocheng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148107","display_name":"Space Engineering University","ror":"https://ror.org/04rj1td02","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210148107"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaocheng Wang","raw_affiliation_strings":["State Key Laboratory of Environment Characteristics and Effects for Near-Space, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Environment Characteristics and Effects for Near-Space, Beijing, China","institution_ids":["https://openalex.org/I4210148107"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123441439"],"corresponding_institution_ids":["https://openalex.org/I4210114105"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14576613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":null,"first_page":"987","last_page":"991"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.024900000542402267,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7663000226020813},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6888999938964844},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4959999918937683},{"id":"https://openalex.org/keywords/modulation","display_name":"Modulation (music)","score":0.4828999936580658},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.4090000092983246},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3490000069141388},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.3472000062465668},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.3361999988555908},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.32420000433921814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7980999946594238},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7663000226020813},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6888999938964844},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4959999918937683},{"id":"https://openalex.org/C123079801","wikidata":"https://www.wikidata.org/wiki/Q750240","display_name":"Modulation (music)","level":2,"score":0.4828999936580658},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4564000070095062},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.4090000092983246},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3490000069141388},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3472000062465668},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.303600013256073},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.29260000586509705},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.28999999165534973},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C133082901","wikidata":"https://www.wikidata.org/wiki/Q272826","display_name":"Electronic warfare","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C11930861","wikidata":"https://www.wikidata.org/wiki/Q181417","display_name":"Frequency modulation","level":3,"score":0.274399995803833},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2703000009059906},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26989999413490295},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26350000500679016},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.26170000433921814},{"id":"https://openalex.org/C152800680","wikidata":"https://www.wikidata.org/wiki/Q5408491","display_name":"Tactical communications","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.2583000063896179}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcomm.2026.3654956","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2026.3654956","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5956853450","display_name":null,"funder_award_id":"2024T170492","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8047082324","display_name":null,"funder_award_id":"U22B2057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8513938477","display_name":null,"funder_award_id":"2025NS10","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2130014182","https://openalex.org/W2194775991","https://openalex.org/W2272847350","https://openalex.org/W2888024549","https://openalex.org/W3163307436","https://openalex.org/W4320029370","https://openalex.org/W4360605394","https://openalex.org/W4391547481","https://openalex.org/W4403182228","https://openalex.org/W4405933978","https://openalex.org/W4407247222","https://openalex.org/W4410294928","https://openalex.org/W4415797553"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,15,69,90,96],"development":[2],"of":[3,17,98],"wireless":[4],"communication":[5,81],"devices,":[6],"due":[7],"to":[8,50,88],"limited":[9],"spectrum":[10,19],"resources":[11],"and":[12,36,83],"rising":[13],"interference,":[14],"importance":[16],"effective":[18],"sensing":[20],"techniques":[21],"has":[22],"drawn":[23],"much":[24],"attention.":[25],"Hereby,":[26],"modulation":[27,70,91],"recognition":[28,71,78],"serves":[29],"as":[30],"a":[31,76],"cornerstone":[32],"for":[33,68,80],"non-cooperative":[34],"communications":[35],"anti-jamming":[37],"operations.":[38],"While":[39],"deep":[40],"learning":[41],"becomes":[42],"popular":[43],"through":[44],"autonomous":[45],"feature":[46],"extraction,":[47],"its":[48],"vulnerability":[49],"adversarial":[51,102],"attacks":[52],"poses":[53],"critical":[54],"security":[55],"risks.":[56],"To":[57],"address":[58],"this":[59],"challenge,":[60],"FlowSlicer":[61,99],"is":[62],"proposed":[63],"based":[64],"on":[65],"diffusion":[66],"models":[67],"domain.":[72],"Furthermore,":[73],"we":[74],"explore":[75],"segmented":[77],"strategy":[79],"signals":[82],"propose":[84],"an":[85],"aggregation":[86],"algorithm":[87],"enhance":[89],"recognition.":[92],"Simulation":[93],"results":[94],"validate":[95],"robustness":[97],"under":[100],"various":[101],"attack":[103],"strategies.":[104]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-21T00:00:00"}
