{"id":"https://openalex.org/W7084765072","doi":"https://doi.org/10.1109/tifs.2025.3616625","title":"Model-Hopping Semantic Communication System for a Reliable and Secure Transmission","display_name":"Model-Hopping Semantic Communication System for a Reliable and Secure Transmission","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7084765072","doi":"https://doi.org/10.1109/tifs.2025.3616625"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3616625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3616625","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hongchao Jiang","orcid":"https://orcid.org/0009-0007-0119-6323"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongchao Jiang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chen Dong","orcid":"https://orcid.org/0000-0002-3443-1453"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Dong","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haotai Liang","orcid":"https://orcid.org/0000-0003-2733-4353"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haotai Liang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaodong Xu","orcid":"https://orcid.org/0000-0003-4245-5989"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yucheng Liu","orcid":"https://orcid.org/0009-0003-9712-0219"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yucheng Liu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhe Zheng","orcid":"https://orcid.org/0009-0006-9694-2183"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Zheng","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ping Zhang","orcid":"https://orcid.org/0000-0002-0269-104X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63116282,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"10525","last_page":"10540"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10137","display_name":"Multiple Sclerosis Research Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2734","display_name":"Pathology and Forensic Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T10137","display_name":"Multiple Sclerosis Research Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2734","display_name":"Pathology and Forensic Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11735","display_name":"Peripheral Neuropathies and Disorders","score":0.00039999998989515007,"subfield":{"id":"https://openalex.org/subfields/2728","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10094","display_name":"Epilepsy research and treatment","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/2738","display_name":"Psychiatry and Mental health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7994999885559082},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6014999747276306},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5888000130653381},{"id":"https://openalex.org/keywords/multipath-propagation","display_name":"Multipath propagation","score":0.42410001158714294},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.4032000005245209},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.40119999647140503},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.38830000162124634},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3578000068664551},{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.34700000286102295}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8636999726295471},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7994999885559082},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6014999747276306},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5888000130653381},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5665000081062317},{"id":"https://openalex.org/C161218011","wikidata":"https://www.wikidata.org/wiki/Q11827794","display_name":"Multipath propagation","level":3,"score":0.42410001158714294},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.4032000005245209},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.40119999647140503},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.38830000162124634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38109999895095825},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3578000068664551},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.34700000286102295},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3046000003814697},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.3012000024318695},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2976999878883362},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.28349998593330383},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.262800008058548},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2624000012874603},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3616625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3616625","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1580389772","https://openalex.org/W2096733369","https://openalex.org/W2274029178","https://openalex.org/W2946889564","https://openalex.org/W2962785568","https://openalex.org/W2962858109","https://openalex.org/W2962967409","https://openalex.org/W2963174256","https://openalex.org/W3016715915","https://openalex.org/W3036851434","https://openalex.org/W3044772937","https://openalex.org/W3103412725","https://openalex.org/W3153047847","https://openalex.org/W3166791908","https://openalex.org/W3201394241","https://openalex.org/W4229333757","https://openalex.org/W4311768025","https://openalex.org/W4312766166","https://openalex.org/W4313350178","https://openalex.org/W4313350185","https://openalex.org/W4313350220","https://openalex.org/W4313387436","https://openalex.org/W4313455370","https://openalex.org/W4315629832","https://openalex.org/W4315630799","https://openalex.org/W4319302797","https://openalex.org/W4366957333","https://openalex.org/W4376467180","https://openalex.org/W4379157732","https://openalex.org/W4384158405","https://openalex.org/W4386025568","https://openalex.org/W4387831864","https://openalex.org/W4387869747","https://openalex.org/W4387870828","https://openalex.org/W4387885784","https://openalex.org/W4388739236","https://openalex.org/W4388936959","https://openalex.org/W4389545409","https://openalex.org/W4391496530","https://openalex.org/W4394939043","https://openalex.org/W4396712624","https://openalex.org/W4399346966","https://openalex.org/W4399426488","https://openalex.org/W4400276387","https://openalex.org/W4400277083","https://openalex.org/W4401871087","https://openalex.org/W4402156277","https://openalex.org/W4402475090","https://openalex.org/W4402742683","https://openalex.org/W4403126393","https://openalex.org/W4405351316","https://openalex.org/W4406858359","https://openalex.org/W4406858660","https://openalex.org/W4407374690","https://openalex.org/W4408324852","https://openalex.org/W4410639310","https://openalex.org/W4412398815"],"related_works":[],"abstract_inverted_index":{"As":[0],"an":[1,65],"effective":[2],"mechanism":[3],"for":[4],"safeguarding":[5],"information":[6,105],"against":[7],"eavesdropping":[8],"in":[9,33,103,140],"semantic":[10,14,69,83,92],"communication":[11],"systems,":[12],"existing":[13],"encryption":[15,93,101],"methods":[16],"face":[17],"limitations:":[18],"vulnerability":[19],"to":[20,63,121,128,135],"sophisticated":[21],"attacks":[22],"from":[23,54],"active":[24],"eavesdroppers":[25],"and":[26,132],"compromised":[27],"recovery":[28,117],"performance":[29,118,131],"of":[30,68,137],"legitimate":[31,114],"receivers":[32],"multipath":[34,79,125],"channels":[35],"with":[36],"strong":[37,124],"effects.":[38],"To":[39],"address":[40],"these":[41],"challenges,":[42],"we":[43],"propose":[44],"the":[45,100],"Model-Hopping":[46],"Semantic":[47],"Communication":[48],"System":[49],"(MHSCS)":[50],"by":[51,71,119],"drawing":[52],"inspiration":[53],"frequency":[55],"hopping":[56],"technique.":[57],"Specifically,":[58],"model-hopping":[59],"coding":[60,70,84],"is":[61,85,95],"designed":[62],"implement":[64],"enhanced":[66],"method":[67,94],"adaptive":[72],"model":[73],"selection,":[74],"boosting":[75],"transmission":[76],"reliability":[77],"over":[78],"channels.":[80],"Considering":[81],"that":[82],"a":[86,90],"natural":[87],"protection":[88],"layer,":[89],"double-layer":[91],"proposed,":[96],"which":[97],"can":[98],"improve":[99],"effects":[102,126],"severe":[104,141],"leakage":[106,139,142],"scenarios.":[107,143],"The":[108],"experimental":[109],"results":[110],"show":[111],"MHSCS":[112],"increases":[113],"receivers\u2019":[115],"image":[116],"up":[120,134],"18.60%":[122],"under":[123],"compared":[127],"baselines\u2019":[129],"optimal":[130],"prevents":[133],"81.87%":[136],"privacy":[138]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
