{"id":"https://openalex.org/W4415398637","doi":"https://doi.org/10.1109/tcomm.2025.3624165","title":"Helper-Assisted Coding for Gaussian Wiretap Channels: Deep Learning Meets PhySec","display_name":"Helper-Assisted Coding for Gaussian Wiretap Channels: Deep Learning Meets PhySec","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415398637","doi":"https://doi.org/10.1109/tcomm.2025.3624165"},"language":null,"primary_location":{"id":"doi:10.1109/tcomm.2025.3624165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2025.3624165","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2601.20678","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044495440","display_name":"Vidhi Rana","orcid":"https://orcid.org/0000-0003-2518-5163"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vidhi Rana","raw_affiliation_strings":["Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047776960","display_name":"R\u00e9mi A. Chou","orcid":"https://orcid.org/0000-0003-4431-3175"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R\u00e9mi A. Chou","raw_affiliation_strings":["Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101925384","display_name":"Taejoon Kim","orcid":"https://orcid.org/0000-0002-4017-9530"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taejoon Kim","raw_affiliation_strings":["School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044495440"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29166039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"73","issue":"12","first_page":"13199","last_page":"13213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.8683000206947327,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.8683000206947327,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.8551999926567078,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.8528000116348267,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7675999999046326},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5917999744415283},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47189998626708984},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4625000059604645},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4375999867916107},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4325999915599823},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4262000024318695},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3896999955177307},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3856000006198883}],"concepts":[{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7675999999046326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7046999931335449},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5917999744415283},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47850000858306885},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47189998626708984},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4625000059604645},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4375999867916107},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4325999915599823},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4262000024318695},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3961000144481659},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3896999955177307},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3856000006198883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3815000057220459},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3734000027179718},{"id":"https://openalex.org/C83204339","wikidata":"https://www.wikidata.org/wiki/Q7523915","display_name":"Single antenna interference cancellation","level":3,"score":0.36959999799728394},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.35740000009536743},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.33660000562667847},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3082999885082245},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.28529998660087585},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2597000002861023},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.25619998574256897},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.2558000087738037},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcomm.2025.3624165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2025.3624165","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2601.20678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2601.20678","pdf_url":"https://arxiv.org/pdf/2601.20678","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2601.20678","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2601.20678","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2601.20678","pdf_url":"https://arxiv.org/pdf/2601.20678","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1446151838","display_name":null,"funder_award_id":"2514415","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1482643429","display_name":"Collaborative Research: NSF-AoF: CNS Core: Small: Towards Scalable and Al-based Solutions for Beyond-5G Radio Access Networks","funder_award_id":"2451268","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3402474711","display_name":null,"funder_award_id":"2515378","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6753519185","display_name":null,"funder_award_id":"CNS2514415","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7512131713","display_name":null,"funder_award_id":"CNS2451268","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8472827588","display_name":null,"funder_award_id":"and O","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320333578","display_name":"Office of the Under Secretary of Defense","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415398637.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Consider":[0],"the":[1,19,30,37,45,71,85,98,116,126,167,195,206,221,235],"Gaussian":[2],"wiretap":[3,127,224],"channel,":[4],"where":[5,228],"a":[6,11,15,61,67,79,149,157,173],"transmitter":[7,46,73],"wishes":[8],"to":[9,14,47,55,65,69,74,114,142,197,220,234],"send":[10,231],"confidential":[12,232],"message":[13],"legitimate":[16,38,236],"receiver":[17,207],"in":[18,59,94,136],"presence":[20],"of":[21,120,138],"an":[22,162,184],"eavesdropper.":[23],"It":[24],"is":[25,42,217],"well":[26],"known":[27,53],"that":[28,145,188,213],"if":[29],"eavesdropper":[31],"experiences":[32],"less":[33],"channel":[34,225],"noise":[35],"than":[36],"receiver,":[39],"then":[40],"it":[41],"impossible":[43],"for":[44,84,97],"achieve":[48,75],"positive":[49],"secrecy":[50],"rates.":[51],"A":[52],"solution":[54,80],"this":[56,95],"issue":[57],"consists":[58],"involving":[60],"second":[62],"transmitter,":[63],"referred":[64],"as":[66],"helper,":[68],"help":[70],"first":[72,99],"security.":[76],"While":[77],"such":[78],"has":[81],"been":[82],"studied":[83],"asymptotic":[86],"blocklength":[87,106],"regime":[88],"and":[89,104,111,118,172],"via":[90],"non-constructive":[91],"coding":[92],"schemes,":[93],"paper,":[96],"time,":[100],"we":[101,211],"design":[102,153,216],"explicit":[103],"short":[105],"codes":[107,132,144],"using":[108],"deep":[109],"learning":[110],"cryptographic":[112],"tools":[113],"demonstrate":[115],"benefit":[117],"practicality":[119],"cooperation":[121],"between":[122],"two":[123,229],"transmitters":[124,230],"over":[125],"channel.":[128],"Specifically,":[129],"our":[130,214],"proposed":[131],"show":[133,212],"strict":[134],"improvement":[135],"terms":[137],"information":[139],"leakage":[140],"compared":[141],"existing":[143],"do":[146],"not":[147],"consider":[148],"helper.":[150],"Our":[151],"code":[152,215],"approach":[154],"relies":[155],"on":[156,166],"reliability":[158],"layer,":[159],"implemented":[160,176],"with":[161,177,226],"autoencoder":[163,186],"architecture":[164,187],"based":[165],"successive":[168],"interference":[169,204],"cancellation":[170],"method,":[171],"security":[174],"layer":[175],"universal":[178],"hash":[179],"functions.":[180],"We":[181],"also":[182,218],"propose":[183],"alternative":[185],"significantly":[189],"reduces":[190],"training":[191],"time":[192],"by":[193,205],"allowing":[194],"decoders":[196],"independently":[198],"estimate":[199],"messages":[200,233],"without":[201],"successively":[202],"canceling":[203],"during":[208],"training.":[209],"Additionally,":[210],"applicable":[219],"multiple":[222],"access":[223],"helpers,":[227],"receiver.":[237]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-22T00:00:00"}
