{"id":"https://openalex.org/W4417284691","doi":"https://doi.org/10.1109/pimrc62392.2025.11274860","title":"Modular Neural Wiretap Codes for Fading Channels","display_name":"Modular Neural Wiretap Codes for Fading Channels","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417284691","doi":"https://doi.org/10.1109/pimrc62392.2025.11274860"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11274860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11274860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096680421","display_name":"Daniel Seifert","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Daniel Seifert","raw_affiliation_strings":["Technische Universit&#x00E4;t,Chair of Information Theory and Machine Learning,Dresden,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t,Chair of Information Theory and Machine Learning,Dresden,Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016620064","display_name":"Onur G\u00fcnl\u00fc","orcid":"https://orcid.org/0000-0002-0313-7788"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Onur G\u00fcnl\u00fc","raw_affiliation_strings":["Link&#x00F6;ping University,Information Theory and Security Laboratory (ITSL),Sweden"],"affiliations":[{"raw_affiliation_string":"Link&#x00F6;ping University,Information Theory and Security Laboratory (ITSL),Sweden","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["Technische Universit&#x00E4;t,Chair of Information Theory and Machine Learning,Dresden,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t,Chair of Information Theory and Machine Learning,Dresden,Germany","institution_ids":["https://openalex.org/I78650965"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5096680421"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43154934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8014000058174133,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8014000058174133,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.15369999408721924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.007699999958276749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.8463000059127808},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6327000260353088},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.548799991607666},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.49619999527931213},{"id":"https://openalex.org/keywords/fading-distribution","display_name":"Fading distribution","score":0.45190000534057617},{"id":"https://openalex.org/keywords/rician-fading","display_name":"Rician fading","score":0.3865000009536743},{"id":"https://openalex.org/keywords/probability-of-error","display_name":"Probability of error","score":0.3515999913215637},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.3167000114917755}],"concepts":[{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.8463000059127808},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6327000260353088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6183000206947327},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.548799991607666},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.49619999527931213},{"id":"https://openalex.org/C161126049","wikidata":"https://www.wikidata.org/wiki/Q5429266","display_name":"Fading distribution","level":5,"score":0.45190000534057617},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4239000082015991},{"id":"https://openalex.org/C60472773","wikidata":"https://www.wikidata.org/wiki/Q7331156","display_name":"Rician fading","level":4,"score":0.3865000009536743},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3684000074863434},{"id":"https://openalex.org/C92224547","wikidata":"https://www.wikidata.org/wiki/Q1673216","display_name":"Probability of error","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32600000500679016},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3050999939441681},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3010999858379364},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.3000999987125397},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C206468330","wikidata":"https://www.wikidata.org/wiki/Q834373","display_name":"Code rate","level":3,"score":0.26919999718666077},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.2646999955177307},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.25600001215934753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11274860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11274860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W2043769961","https://openalex.org/W2124602541","https://openalex.org/W2144007657","https://openalex.org/W2156690269","https://openalex.org/W2163962630","https://openalex.org/W2211831180","https://openalex.org/W2734408173","https://openalex.org/W2963183582","https://openalex.org/W3080381642","https://openalex.org/W4210774718","https://openalex.org/W4298036233","https://openalex.org/W4316661047","https://openalex.org/W4372266497","https://openalex.org/W4376480650","https://openalex.org/W4398172741","https://openalex.org/W4407838344"],"related_works":[],"abstract_inverted_index":{"The":[0],"wiretap":[1,66],"channel":[2,69],"is":[3,15,39],"a":[4,57],"well-studied":[5],"problem":[6],"in":[7,30,91,96],"the":[8,18,31,42,52,75,78,88,92,99,104,108,117,122,126],"physical":[9],"layer":[10],"security":[11,129],"literature.":[12],"Although":[13],"it":[14],"proven":[16],"that":[17],"decoding":[19],"error":[20,82],"probability":[21,80],"and":[22,83,102,120],"information":[23,84],"leakage":[24],"can":[25],"be":[26],"made":[27],"arbitrarily":[28],"small":[29],"asymptotic":[32],"regime,":[33],"further":[34],"research":[35],"on":[36,41],"finite-blocklength":[37,60],"codes":[38,90],"required":[40],"path":[43],"towards":[44],"practical,":[45],"secure":[46],"communication":[47],"systems.":[48],"This":[49],"work":[50],"provides":[51],"first":[53],"experimental":[54],"characterization":[55],"of":[56,77,81,94,98,106,110,116],"deep":[58],"learning-based,":[59],"code":[61],"construction":[62],"for":[63,125],"multi-tap":[64],"fading":[65,95,111,118],"channels":[67],"without":[68],"state":[70],"information.":[71],"In":[72],"addition":[73],"to":[74],"evaluation":[76],"average":[79],"leakage,":[85],"we":[86],"examine":[87],"designed":[89],"presence":[93],"terms":[97],"equivocation":[100],"rate":[101],"illustrate":[103],"influence":[105],"(i)":[107],"number":[109],"taps,":[112],"(ii)":[113],"differing":[114],"variances":[115],"coefficients,":[119],"(iii)":[121],"seed":[123],"selection":[124],"hash":[127],"function-based":[128],"layer.":[130]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
