{"id":"https://openalex.org/W4387885784","doi":"https://doi.org/10.1109/mnet.2023.3327111","title":"Secure Semantic Communications: Challenges, Approaches, and Opportunities","display_name":"Secure Semantic Communications: Challenges, Approaches, and Opportunities","publication_year":2023,"publication_date":"2023-10-23","ids":{"openalex":"https://openalex.org/W4387885784","doi":"https://doi.org/10.1109/mnet.2023.3327111"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.2023.3327111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3327111","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100378732","display_name":"Jing Wang","orcid":"https://orcid.org/0009-0000-3624-7759"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068782412","display_name":"Hongyang Du","orcid":"https://orcid.org/0000-0002-8220-6525"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hongyang Du","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070769211","display_name":"Xiangyun Tang","orcid":"https://orcid.org/0000-0002-5511-0720"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyun Tang","raw_affiliation_strings":["School of Information Engineering, Minzu University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Minzu University of China, Beijing, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062761975","display_name":"Jiawen Kang","orcid":"https://orcid.org/0000-0002-8218-3490"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawen Kang","raw_affiliation_strings":["School of Automation, Guangdong University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Guangdong University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048770374","display_name":"Yaoling Ding","orcid":"https://orcid.org/0000-0001-6416-7203"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaoling Ding","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5047030842"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":7.9337,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97860832,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"38","issue":"4","first_page":"197","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8844476938247681},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.707507312297821},{"id":"https://openalex.org/keywords/semantic-computing","display_name":"Semantic computing","score":0.5364392995834351},{"id":"https://openalex.org/keywords/semantic-grid","display_name":"Semantic grid","score":0.5057690143585205},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4937523305416107},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48520758748054504},{"id":"https://openalex.org/keywords/semantic-technology","display_name":"Semantic technology","score":0.4697559177875519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44814983010292053},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26984578371047974},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.2642439603805542},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23056596517562866}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8844476938247681},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.707507312297821},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.5364392995834351},{"id":"https://openalex.org/C103692084","wikidata":"https://www.wikidata.org/wiki/Q1765824","display_name":"Semantic grid","level":3,"score":0.5057690143585205},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4937523305416107},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48520758748054504},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.4697559177875519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44814983010292053},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26984578371047974},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.2642439603805542},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23056596517562866},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/mnet.2023.3327111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3327111","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},{"id":"pmh:oai:hub.hku.hk:10722/352983","is_oa":false,"landing_page_url":"https://hub.hku.hk/handle/10722/352983","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.550000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2607683755","https://openalex.org/W2978348882","https://openalex.org/W3020980426","https://openalex.org/W3091108228","https://openalex.org/W3163222347","https://openalex.org/W3204814846","https://openalex.org/W4205683915","https://openalex.org/W4285214146","https://openalex.org/W4312050893","https://openalex.org/W4312766166","https://openalex.org/W4317796249","https://openalex.org/W4319302797","https://openalex.org/W4365420366","https://openalex.org/W4385080324","https://openalex.org/W6728757088","https://openalex.org/W6776716199"],"related_works":["https://openalex.org/W2280628760","https://openalex.org/W3134365128","https://openalex.org/W4229736327","https://openalex.org/W2495387725","https://openalex.org/W3012445987","https://openalex.org/W2108020129","https://openalex.org/W2101810124","https://openalex.org/W4243025272","https://openalex.org/W4236764349","https://openalex.org/W1990650227"],"abstract_inverted_index":{"Semantic":[0],"communication":[1,19,53,101],"has":[2],"emerged":[3],"as":[4],"a":[5,18,29,32,114,123],"promising":[6],"technique":[7],"that":[8],"can":[9],"integrate":[10],"the":[11,70,96,119],"meaning":[12],"and":[13,27,31,36,58,72,102,132],"context":[14],"of":[15,74,89,109,122],"information":[16],"into":[17],"process.":[20],"It":[21],"goes":[22],"beyond":[23],"raw":[24],"data":[25],"transmission":[26],"enables":[28],"sender":[30],"receiver":[33],"to":[34,49,55,117],"transmit":[35],"recover":[37],"semantic":[38,52,62,75,90,100,125],"messages":[39],"through":[40],"their":[41],"respective":[42],"knowledge":[43],"bases.":[44],"However,":[45],"it":[46],"is":[47],"challenging":[48],"achieve":[50],"secure":[51,99],"due":[54],"complicated":[56],"security":[57,83],"privacy":[59],"threats":[60,84],"in":[61,86,135],"communication.":[63,76,91],"In":[64],"this":[65,136],"article,":[66],"we":[67,78,94,128],"first":[68],"introduce":[69],"background":[71],"architecture":[73],"Then,":[77],"sort":[79],"out":[80],"multiple":[81],"potential":[82],"existing":[85],"each":[87,107],"step":[88],"Following":[92],"that,":[93],"summarize":[95],"requirements":[97],"for":[98,106],"provide":[103],"possible":[104],"defenses":[105],"type":[108],"attacks.":[110],"We":[111],"also":[112],"present":[113],"case":[115],"study":[116],"illustrate":[118],"training":[120],"process":[121],"reliable":[124],"encoder/decoder.":[126],"Finally,":[127],"discuss":[129],"open":[130],"issues":[131],"future":[133],"directions":[134],"research":[137],"field.":[138]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":11}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
