{"id":"https://openalex.org/W4409077311","doi":"https://doi.org/10.1109/tccn.2025.3556777","title":"Secure and Robust Joint Source-Channel Coding With Semantic Clustering and Adversarial Purification","display_name":"Secure and Robust Joint Source-Channel Coding With Semantic Clustering and Adversarial Purification","publication_year":2025,"publication_date":"2025-04-01","ids":{"openalex":"https://openalex.org/W4409077311","doi":"https://doi.org/10.1109/tccn.2025.3556777"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2025.3556777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3556777","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xin Huang","orcid":"https://orcid.org/0000-0001-5162-1067"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Huang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-5162-1067","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101328216","display_name":"Liang Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zeng","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0006-7086-7349","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068157884","display_name":"Yaojun Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaojun Lu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0004-8491-0024","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044674658","display_name":"Jianping An","orcid":"https://orcid.org/0000-0002-6441-9711"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping An","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6441-9711","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.6531,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68102705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":null,"first_page":"204","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8283615112304688},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5938510298728943},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5725745558738708},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.558210551738739},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.554235577583313},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46051207184791565},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.44683247804641724},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.3490905165672302},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25676268339157104},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24331200122833252},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08933565020561218}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8283615112304688},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5938510298728943},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5725745558738708},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.558210551738739},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.554235577583313},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46051207184791565},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.44683247804641724},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3490905165672302},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25676268339157104},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24331200122833252},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08933565020561218},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2025.3556777","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3556777","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2883755052","display_name":null,"funder_award_id":"2023YFC3310500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4771001808","display_name":null,"funder_award_id":"2022M720447","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6789455757","display_name":null,"funder_award_id":"2024CX06025","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1580389772","https://openalex.org/W1995875735","https://openalex.org/W2133665775","https://openalex.org/W2150593711","https://openalex.org/W2741137940","https://openalex.org/W2746600820","https://openalex.org/W2774644650","https://openalex.org/W2946889564","https://openalex.org/W2963542245","https://openalex.org/W3023338037","https://openalex.org/W3107617916","https://openalex.org/W3138516171","https://openalex.org/W3163082404","https://openalex.org/W3190138134","https://openalex.org/W3207494168","https://openalex.org/W4214634256","https://openalex.org/W4226042246","https://openalex.org/W4293846201","https://openalex.org/W4302366751","https://openalex.org/W4312766166","https://openalex.org/W4313455370","https://openalex.org/W4315629655","https://openalex.org/W4365420366","https://openalex.org/W4372348936","https://openalex.org/W4379924580","https://openalex.org/W4386737030","https://openalex.org/W4388979610","https://openalex.org/W4390873191","https://openalex.org/W4399896651","https://openalex.org/W4399996524","https://openalex.org/W4400409682"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W4242191701","https://openalex.org/W2545303390","https://openalex.org/W2154612888","https://openalex.org/W3203628011","https://openalex.org/W1985968643","https://openalex.org/W2152012878","https://openalex.org/W2133231244"],"abstract_inverted_index":{"Vision":[0],"Transformer":[1,5,60],"(ViT)":[2],"and":[3,20,117,131,151,173,182,204],"Swin":[4,59],"have":[6,32],"attracted":[7],"significant":[8,109],"attention":[9,44],"in":[10,36,45,58,103,157],"the":[11,68,72,91,115,120,141,145,153,168,171,180,183,192],"fields":[12],"of":[13,42,119,144,201],"deep":[14,104],"learning-based":[15,105],"joint":[16],"source-channel":[17],"coding":[18],"(JSCC)":[19],"semantic":[21,69,112,129,154,199],"communication":[22,184],"due":[23],"to":[24,95,100,111,207],"their":[25],"excellent":[26],"visual":[27],"modeling":[28,200],"capabilities.":[29],"However,":[30],"we":[31,126,160],"identified":[33],"three":[34],"challenges":[35],"these":[37,124],"methods:":[38],"(1)":[39],"Quadratic":[40],"complexity":[41,143],"global":[43],"ViT":[46],"introduces":[47],"a":[48,108,128,162],"substantial":[49],"computational":[50,62,142],"burden;":[51],"(2)":[52],"Token":[53],"grouping":[54],"based":[55],"on":[56,167],"windows":[57,83],"reduces":[61,140],"complexity,":[63],"but":[64,148],"this":[65],"approach":[66],"neglects":[67],"information":[70,155],"within":[71],"tokens.":[73],"It":[74,137],"may":[75],"divide":[76,85],"tokens":[77,86],"with":[78,87],"similar":[79],"semantics":[80,89],"into":[81,90],"different":[82,88],"or":[84],"same":[92],"window,":[93],"leading":[94],"reduced":[96],"effectiveness;":[97],"(3)":[98],"Vulnerability":[99],"adversarial":[101,132,164,176,209],"attacks":[102,177],"JSCC":[106,134],"poses":[107],"threat":[110],"communication,":[113],"compromising":[114],"security":[116,174],"robustness":[118,172],"system.":[121],"To":[122],"address":[123],"challenges,":[125],"propose":[127],"clustering":[130],"purification-based":[133],"(SCAPJSCC)":[135],"scheme.":[136],"not":[138],"only":[139],"self-attention":[146],"mechanism":[147],"also":[149],"preserves":[150],"leverages":[152],"inherent":[156],"images.":[158],"Furthermore,":[159],"introduce":[161],"plug-and-play":[163],"purification":[165],"module":[166],"receiver,":[169],"enhancing":[170],"against":[175],"at":[178],"both":[179],"transmitter":[181],"channel.":[185],"Experimental":[186],"results":[187],"demonstrate":[188],"that":[189],"SCAPJSCC":[190],"outperforms":[191],"state-of-the-art":[193],"method":[194],"SwinJSCC,":[195],"achieving":[196],"more":[197],"effective":[198],"image":[202],"information,":[203],"stronger":[205],"resilience":[206],"various":[208],"attacks.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
