{"id":"https://openalex.org/W7091367589","doi":"https://doi.org/10.1109/tnse.2025.3621910","title":"Identity-Preserving Covert Communication With Generative Perturbation","display_name":"Identity-Preserving Covert Communication With Generative Perturbation","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W7091367589","doi":"https://doi.org/10.1109/tnse.2025.3621910"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3621910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3621910","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhaoyi Lu","orcid":"https://orcid.org/0000-0003-4096-3322"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaoyi Lu","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wenchao Xu","orcid":"https://orcid.org/0000-0003-0983-387X"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenchao Xu","raw_affiliation_strings":["Division of Integrative Systems and Design, The Hong Kong University of Science and Technology, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Division of Integrative Systems and Design, The Hong Kong University of Science and Technology, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ming Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Tu","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xin Xie","orcid":"https://orcid.org/0000-0002-0945-969X"},"institutions":[{"id":"https://openalex.org/I3133134087","display_name":"Lanzhou Jiaotong University","ror":"https://ror.org/03144pv92","country_code":"CN","type":"education","lineage":["https://openalex.org/I3133134087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xie","raw_affiliation_strings":["School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou, China","institution_ids":["https://openalex.org/I3133134087"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.75590351,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"3701","last_page":"3719"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9135000109672546,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9135000109672546,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.029400000348687172,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.02370000071823597,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.8187999725341797},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7071999907493591},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4374000132083893},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.4348999857902527},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4327000081539154},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4092999994754791},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.391400009393692}],"concepts":[{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.8187999725341797},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7071999907493591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6636999845504761},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4374000132083893},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.4348999857902527},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4327000081539154},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4090000092983246},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.391400009393692},{"id":"https://openalex.org/C16210155","wikidata":"https://www.wikidata.org/wiki/Q5154140","display_name":"Communication noise","level":2,"score":0.36410000920295715},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3285999894142151},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.31690001487731934},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3125999867916107},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.2614000141620636}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2025.3621910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3621910","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-167854","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-167854","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.41562095284461975}],"awards":[{"id":"https://openalex.org/G1274132208","display_name":null,"funder_award_id":"62171278","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G649695974","display_name":null,"funder_award_id":"62202290","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"covert":[1,67,90,149,174,192],"communication":[2,193],"gains":[3],"prominence":[4],"in":[5],"wireless":[6],"security,":[7],"recent":[8],"studies":[9],"have":[10],"proposed":[11,170],"embedding":[12,69],"hidden":[13],"messages":[14],"into":[15],"physical-layer":[16],"signals":[17],"via":[18],"subtle":[19],"perturbations.":[20,100],"However,":[21],"most":[22],"existing":[23],"works":[24],"focus":[25],"solely":[26],"on":[27,35,135,146,181],"symbol-level":[28],"modifications":[29],"and":[30,52,108,151,162,198],"often":[31],"neglect":[32],"the":[33,39,148,152,169],"impact":[34,180],"transmitter":[36,153],"identity,":[37,154],"particularly":[38],"preservation":[40,115,200],"of":[41,97],"radio":[42],"frequency":[43],"(RF)":[44],"fingerprints":[45],"that":[46,65,168],"are":[47],"critical":[48],"for":[49,191],"device":[50],"authentication":[51],"stealth.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57,126],"propose":[58,127],"an":[59,128],"Identity-Preserving":[60],"Covert":[61],"Communication":[62],"(IPCC)":[63],"framework":[64,171],"enables":[66],"message":[68,150],"through":[70,201],"carefully":[71],"designed":[72],"phase":[73,99],"perturbations":[74,144],"applied":[75],"to":[76,117],"pilot":[77],"signals.":[78],"We":[79],"first":[80],"present":[81],"a":[82,95,136,188],"Random":[83],"Phase":[84],"Perturbation":[85,131],"(RPP)":[86],"method,":[87],"where":[88],"each":[89],"symbol":[91,160,175],"is":[92],"represented":[93],"by":[94,194],"sequence":[96],"Gaussian-distributed":[98],"This":[101,185],"sequence-level":[102],"perturbation":[103,203],"design":[104],"mimics":[105],"natural":[106],"noise":[107],"enhances":[109],"stealth,":[110],"while":[111],"implicitly":[112],"offering":[113],"fingerprint":[114,163,183],"due":[116],"its":[118],"statistical":[119,196],"consistency.":[120],"To":[121],"further":[122],"improve":[123],"identity":[124,199],"consistency,":[125],"Identity-Aware":[129],"Generative":[130],"(IAGP)":[132],"approach":[133],"based":[134],"Transformer-based":[137],"conditional":[138],"generator.":[139],"The":[140],"generator":[141],"produces":[142],"structured":[143],"conditioned":[145],"both":[147,159],"enabling":[155],"fine-grained":[156],"control":[157],"over":[158],"expressiveness":[161],"stability.":[164],"Extensive":[165],"experiments":[166],"demonstrate":[167],"achieves":[172],"high":[173],"classification":[176],"accuracy":[177],"with":[178],"minimal":[179],"RF":[182],"recognition.":[184],"work":[186],"provides":[187],"new":[189],"perspective":[190],"bridging":[195],"stealth":[197],"principled":[202],"design.":[204]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-16T00:00:00"}
