{"id":"https://openalex.org/W4410698425","doi":"https://doi.org/10.32604/cmc.2025.065362","title":"Semantic Secure Communication Based on the Joint Source-Channel Coding","display_name":"Semantic Secure Communication Based on the Joint Source-Channel Coding","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410698425","doi":"https://doi.org/10.32604/cmc.2025.065362"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065362","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065362","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065362","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100940703","display_name":"Yifeng Lin","orcid":"https://orcid.org/0009-0008-3701-7793"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yifeng Lin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075048645","display_name":"Yuer Yang","orcid":"https://orcid.org/0000-0001-6489-286X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuer Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003872587","display_name":"Jiebin Xie","orcid":"https://orcid.org/0000-0003-1016-7536"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianxiang Xie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013374244","display_name":"Tong Ji","orcid":"https://orcid.org/0000-0002-5119-0305"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tong Ji","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5064809178","display_name":"Peiya Li","orcid":"https://orcid.org/0000-0002-9356-0861"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peiya Li","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100940703"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7386,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72211987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"84","issue":"2","first_page":"2865","last_page":"2882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.6506999731063843,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.6506999731063843,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.646399974822998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5917999744415283,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.6549139022827148},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6412005424499512},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5475954413414001},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.4986844062805176},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41703522205352783},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3787083625793457},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28389790654182434},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.23211529850959778},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.102640300989151},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07914167642593384}],"concepts":[{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.6549139022827148},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6412005424499512},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5475954413414001},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.4986844062805176},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41703522205352783},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3787083625793457},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28389790654182434},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.23211529850959778},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.102640300989151},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07914167642593384},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065362","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065362","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065362","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065362","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W51177791","https://openalex.org/W123723599","https://openalex.org/W149567652","https://openalex.org/W1552282155","https://openalex.org/W2087977439","https://openalex.org/W2108623149","https://openalex.org/W2135479689","https://openalex.org/W2888222055","https://openalex.org/W2902445270","https://openalex.org/W2990649313","https://openalex.org/W3122074554","https://openalex.org/W3168068147","https://openalex.org/W3206899736","https://openalex.org/W4226042246","https://openalex.org/W4290713755","https://openalex.org/W4381785934","https://openalex.org/W4381785967","https://openalex.org/W4382279978","https://openalex.org/W4390064655","https://openalex.org/W4391341772","https://openalex.org/W4400057937","https://openalex.org/W4401806244","https://openalex.org/W4405106582","https://openalex.org/W4405430876","https://openalex.org/W4406611551"],"related_works":["https://openalex.org/W1996130883","https://openalex.org/W2748574964","https://openalex.org/W2888483922","https://openalex.org/W4396737233","https://openalex.org/W2367747139","https://openalex.org/W2111375262","https://openalex.org/W2317728013","https://openalex.org/W4391102217","https://openalex.org/W4252076617","https://openalex.org/W2545303390"],"abstract_inverted_index":{"Semantic":[0],"secure":[1,18,53,164],"communication":[2,54,166],"is":[3,22,63,167],"an":[4,69,76],"emerging":[5],"field":[6],"that":[7,105],"combines":[8],"the":[9,15,31,56,66,110,114,141,156,163],"principles":[10],"of":[11,23,35,58,68,137],"source-channel":[12,60,72,90,116,159],"coding":[13,73,91,160],"with":[14],"need":[16],"for":[17,98],"data":[19],"transmission.":[20],"It":[21],"great":[24],"significance":[25],"in":[26,120,148],"modern":[27],"communications":[28],"to":[29,51,140,155],"protect":[30],"confidentiality":[32],"and":[33,38,42,75,78,87,151],"privacy":[34],"sensitive":[36],"information":[37,40],"prevent":[39],"leaks":[41],"malicious":[43],"attacks.":[44],"This":[45],"paper":[46],"presents":[47],"a":[48],"novel":[49],"approach":[50],"semantic":[52,83,165],"through":[55],"utilization":[57],"joint":[59,71,89,158],"coding,":[61,117],"which":[62],"based":[64,81],"on":[65,82],"design":[67],"automated":[70],"algorithm":[74,80,108,161],"encryption":[77],"decryption":[79],"security.":[84],"The":[85],"traditional":[86,115],"state-of-the-art":[88,157],"algorithms":[92],"are":[93],"selected":[94],"as":[95],"two":[96,142],"baselines":[97],"different":[99],"comparison":[100],"purposes.":[101],"Experimental":[102],"results":[103],"demonstrate":[104],"our":[106,129],"proposed":[107,130],"outperforms":[109],"first":[111],"baseline":[112],"algorithm,":[113],"by":[118],"61.21%":[119],"efficiency":[121],"under":[122],"identical":[123],"channel":[124],"conditions":[125],"().":[126],"In":[127],"security,":[128],"method":[131],"can":[132],"resist":[133],"2":[134],"more":[135],"types":[136],"attacks":[138],"compared":[139,154],"baselines,":[143],"exhibiting":[144],"nearly":[145],"no":[146],"increases":[147],"time":[149],"consumption":[150],"error":[152],"rate":[153],"while":[162],"supported.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
