{"id":"https://openalex.org/W4392405433","doi":"https://doi.org/10.1109/tifs.2024.3372798","title":"DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security","display_name":"DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum Security","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4392405433","doi":"https://doi.org/10.1109/tifs.2024.3372798"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3372798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3372798","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030578911","display_name":"Sicheng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sicheng Zhang","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079985184","display_name":"Yandie Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yandie Yang","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030954331","display_name":"Ziyao Zhou","orcid":"https://orcid.org/0000-0002-5640-4421"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyao Zhou","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046948967","display_name":"Zhi Sun","orcid":"https://orcid.org/0000-0001-7270-4240"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Sun","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100778980","display_name":"Yun Lin","orcid":"https://orcid.org/0000-0002-4002-1282"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Lin","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, P.R. China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030578911"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":9.2936,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.98254898,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"3879","last_page":"3891"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7221007943153381},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7143539190292358},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.701008141040802},{"id":"https://openalex.org/keywords/independence","display_name":"Independence (probability theory)","score":0.6974193453788757},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47824159264564514},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4219423234462738},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38456112146377563},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26804739236831665},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23965054750442505},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1323586106300354}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7221007943153381},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7143539190292358},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.701008141040802},{"id":"https://openalex.org/C35651441","wikidata":"https://www.wikidata.org/wiki/Q625303","display_name":"Independence (probability theory)","level":2,"score":0.6974193453788757},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47824159264564514},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4219423234462738},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38456112146377563},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26804739236831665},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23965054750442505},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1323586106300354},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3372798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3372798","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G1058371652","display_name":null,"funder_award_id":"62201172","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8601930321","display_name":null,"funder_award_id":"2022YFE0136800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1686810756","https://openalex.org/W1686946872","https://openalex.org/W1945616565","https://openalex.org/W2097117768","https://openalex.org/W2129543395","https://openalex.org/W2272847350","https://openalex.org/W2432142698","https://openalex.org/W2560119283","https://openalex.org/W2888024549","https://openalex.org/W2917485473","https://openalex.org/W2946313841","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2964184826","https://openalex.org/W2968867107","https://openalex.org/W2998249317","https://openalex.org/W3000303478","https://openalex.org/W3003438155","https://openalex.org/W3014127772","https://openalex.org/W3023683268","https://openalex.org/W3047492485","https://openalex.org/W3080327351","https://openalex.org/W3087940812","https://openalex.org/W3088383832","https://openalex.org/W3098755434","https://openalex.org/W3105375174","https://openalex.org/W3113270693","https://openalex.org/W3125827990","https://openalex.org/W3133729763","https://openalex.org/W3168231499","https://openalex.org/W3192729241","https://openalex.org/W3193513114","https://openalex.org/W3213282580","https://openalex.org/W4232120769","https://openalex.org/W4289656492","https://openalex.org/W4293469690","https://openalex.org/W4293846201","https://openalex.org/W4302065608","https://openalex.org/W4306893691","https://openalex.org/W4311415873","https://openalex.org/W4313118910","https://openalex.org/W4385975859","https://openalex.org/W4386078135","https://openalex.org/W4386450090","https://openalex.org/W4386495285","https://openalex.org/W6637108112","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6717848421","https://openalex.org/W6729906282","https://openalex.org/W6739868092","https://openalex.org/W6744238343","https://openalex.org/W6752051073","https://openalex.org/W6774469542","https://openalex.org/W6795764869","https://openalex.org/W6845242946"],"related_works":["https://openalex.org/W2595172197","https://openalex.org/W2084856301","https://openalex.org/W2502115930","https://openalex.org/W2127970246","https://openalex.org/W4382618745","https://openalex.org/W2885125400","https://openalex.org/W1001352512","https://openalex.org/W1989889224","https://openalex.org/W2748922771","https://openalex.org/W1987128138"],"abstract_inverted_index":{"Automatic":[0],"Modulation":[1],"Classification":[2],"(AMC)":[3],"is":[4,103,131],"crucial":[5],"for":[6],"monitoring":[7],"the":[8,42,57,67,73,80,106,110,139,145,155,158],"legitimacy":[9],"of":[10,18,60,76,82,91,157,162],"user":[11],"frequency":[12],"behavior":[13],"and":[14,69,100,114,123,147],"identifying":[15],"potential":[16],"sources":[17],"interference":[19],"in":[20,72],"spectrum":[21],"monitoring.":[22],"Deep":[23],"learning-based":[24],"AMC":[25,61],"models":[26],"have":[27],"shown":[28],"excellent":[29],"performance,":[30],"however,":[31],"it":[32],"has":[33],"been":[34],"proven":[35],"susceptible":[36],"to":[37,55,120,133],"adversarial":[38,58,141,163],"attacks.":[39],"To":[40],"address":[41],"problem,":[43],"we":[44,64],"propose":[45],"a":[46,87,92,96,101],"Disentangled":[47],"Hilbert-Schmidt":[48],"Information":[49],"Bottleneck":[50],"Adversarial":[51],"Defense":[52],"(DIBAD)":[53],"method":[54,160],"enhance":[56],"robustness":[59],"models.":[62],"Specifically,":[63],"firstly":[65],"analyze":[66],"task-relevant":[68,122],"task-irrelevant":[70,124,135],"features":[71],"intermediate":[74],"representations":[75],"modulation":[77],"signals":[78],"from":[79],"perspective":[81],"mutual":[83],"information":[84,107,128],"theory.":[85],"Secondly,":[86],"training":[88],"framework":[89],"consisting":[90],"classification":[93,111],"feature":[94,98,112,116],"extractor,":[95,99],"supplementary":[97,115],"classifier":[102],"designed.":[104],"Under":[105],"bottleneck":[108,129],"constraint,":[109],"extractor":[113,117],"are":[118],"used":[119],"extract":[121],"features,":[125,136],"respectively.":[126],"The":[127],"constraint":[130],"employed":[132],"reduce":[134],"thus":[137],"improving":[138],"model\u2019s":[140],"robustness.":[142,164],"Experiments":[143],"on":[144],"RML2016.10a":[146],"DMRadio09.real":[148],"datasets,":[149],"along":[150],"with":[151],"comprehensive":[152],"analysis,":[153],"demonstrate":[154],"superiority":[156],"DIBAD":[159],"terms":[161]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
