{"id":"https://openalex.org/W7127386785","doi":"https://doi.org/10.48550/arxiv.2602.01582","title":"On the Fragility of AI-Based Channel Decoders under Small Channel Perturbations","display_name":"On the Fragility of AI-Based Channel Decoders under Small Channel Perturbations","publication_year":2026,"publication_date":"2026-02-02","ids":{"openalex":"https://openalex.org/W7127386785","doi":"https://doi.org/10.48550/arxiv.2602.01582"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.01582","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124964201","display_name":"Haoyu Lei","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lei, Haoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124966092","display_name":"Mohammad Jalali","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jalali, Mohammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124875147","display_name":"Chin Wa Lau","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lau, Chin Wa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124958557","display_name":"Farzan Farnia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Farnia, Farzan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124964201"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5493000149726868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5493000149726868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.20430000126361847,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.08489999920129776,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.7515000104904175},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6396999955177307},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5928000211715698},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5483999848365784},{"id":"https://openalex.org/keywords/fragility","display_name":"Fragility","score":0.5206999778747559},{"id":"https://openalex.org/keywords/additive-white-gaussian-noise","display_name":"Additive white Gaussian noise","score":0.4027999937534332}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.7515000104904175},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6396999955177307},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5928000211715698},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5849000215530396},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5483999848365784},{"id":"https://openalex.org/C80191262","wikidata":"https://www.wikidata.org/wiki/Q5477668","display_name":"Fragility","level":2,"score":0.5206999778747559},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4246000051498413},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.4027999937534332},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3637000024318695},{"id":"https://openalex.org/C2986577269","wikidata":"https://www.wikidata.org/wiki/Q11306265","display_name":"Random noise","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28519999980926514},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.01582","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.01582","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.01582","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.01582","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2],"deep":[3],"learning":[4],"have":[5],"led":[6],"to":[7,45,60,91,132,159],"AI-based":[8],"error":[9],"correction":[10],"decoders":[11,129],"that":[12,85,98],"report":[13],"empirical":[14],"performance":[15,109,117],"improvements":[16,37],"over":[17],"traditional":[18],"belief-propagation":[19],"(BP)":[20],"decoding":[21,165],"on":[22],"AWGN":[23],"channels.":[24],"While":[25],"such":[26,112],"gains":[27],"are":[28,138],"promising,":[29],"a":[30,87,152],"fundamental":[31],"question":[32,54],"remains:":[33],"where":[34],"do":[35],"these":[36],"come":[38],"from,":[39],"and":[40,74,81,104,135,156],"what":[41],"cost":[42,155],"is":[43],"paid":[44],"achieve":[46],"them?":[47],"In":[48],"this":[49,53],"work,":[50],"we":[51],"study":[52],"through":[55],"the":[56,64],"lens":[57],"of":[58,145],"robustness":[59,154],"distributional":[61],"shifts":[62],"at":[63],"channel":[65,160],"output.":[66],"We":[67],"evaluate":[68],"both":[69],"input-dependent":[70],"adversarial":[71,83,122],"perturbations":[72,84,123,137,144],"(FGM":[73],"projected":[75],"gradient":[76],"methods":[77],"under":[78,111,118],"$\\ell_2$":[79],"constraints)":[80],"universal":[82,136],"apply":[86],"single":[88],"norm-bounded":[89],"shift":[90],"all":[92],"received":[93],"vectors.":[94],"Our":[95],"results":[96],"show":[97],"recent":[99,163],"AI":[100,128,164],"decoders,":[101,134],"including":[102],"ECCT":[103],"CrossMPT,":[105],"could":[106],"suffer":[107],"significant":[108],"degradation":[110],"perturbations,":[113],"despite":[114],"superior":[115],"nominal":[116],"i.i.d.":[119],"AWGN.":[120],"Moreover,":[121],"transfer":[124],"relatively":[125],"strongly":[126],"between":[127],"but":[130],"weakly":[131],"BP-based":[133],"substantially":[139],"more":[140],"harmful":[141],"than":[142],"random":[143],"equal":[146],"norm.":[147],"These":[148],"numerical":[149],"findings":[150],"suggest":[151],"potential":[153],"higher":[157],"sensitivity":[158],"distribution":[161],"underlying":[162],"gains.":[166]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-04T00:00:00"}
