{"id":"https://openalex.org/W7128472274","doi":"https://doi.org/10.48550/arxiv.2602.08801","title":"Verifying DNN-based Semantic Communication Against Generative Adversarial Noise","display_name":"Verifying DNN-based Semantic Communication Against Generative Adversarial Noise","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128472274","doi":"https://doi.org/10.48550/arxiv.2602.08801"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.08801","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049573053","display_name":"Thanh Trung Le","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Le, Thanh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125566618","display_name":"Hai Duong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duong, Hai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125572166","display_name":"ThanhVu Nguyen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen, ThanhVu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125515719","display_name":"Takeshi Matsumura","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matsumura, Takeshi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049573053"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.00139999995008111,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7271000146865845},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7267000079154968},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4246000051498413},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41659998893737793},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.3847000002861023},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3418999910354614},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.3118000030517578}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817300021648407},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7271000146865845},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7267000079154968},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49160000681877136},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4246000051498413},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4244000017642975},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41659998893737793},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3847000002861023},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3483000099658966},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30090001225471497},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.29280000925064087},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27379998564720154},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.08801","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.08801","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.08801","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.08801","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Safety-critical":[0],"applications":[1],"like":[2],"autonomous":[3],"vehicles":[4],"and":[5,21,88,98,111],"industrial":[6],"IoT":[7],"are":[8],"adopting":[9],"semantic":[10,29,46],"communication":[11],"(SemCom)":[12],"systems":[13,38],"using":[14,124],"deep":[15],"neural":[16,70],"networks":[17,95],"to":[18,120,181],"reduce":[19],"bandwidth":[20],"increase":[22],"transmission":[23],"speed":[24],"by":[25,43,79],"transmitting":[26],"only":[27],"task-relevant":[28],"features.":[30,47],"However,":[31],"adversarial":[32,64,81,107],"attacks":[33],"against":[34,59],"these":[35],"DNN-based":[36],"SemCom":[37],"can":[39,114],"cause":[40],"catastrophic":[41],"failures":[42],"manipulating":[44],"transmitted":[45],"Existing":[48],"defense":[49],"mechanisms":[50],"rely":[51],"on":[52,130],"empirical":[53],"approaches":[54],"provide":[55],"no":[56],"formal":[57,148],"guarantees":[58,78,150],"the":[60,160],"full":[61],"spectrum":[62],"of":[63,153,162],"perturbations.":[65],"We":[66],"present":[67],"VSCAN,":[68],"a":[69,156,168],"network":[71],"verification":[72,123,132],"framework":[73],"that":[74,105],"provides":[75],"mathematical":[76],"robustness":[77,149,179],"formulating":[80],"noise":[82],"generation":[83],"as":[84,117],"mixed":[85],"integer":[86],"programming":[87],"verifying":[89],"end-to-end":[90],"properties":[91,133,154],"across":[92],"multiple":[93],"interconnected":[94],"(encoder,":[96],"decoder,":[97],"task":[99],"model).":[100],"Our":[101,128],"key":[102],"insight":[103],"is":[104],"realistic":[106],"constraints":[108],"(power":[109],"limitations":[110],"statistical":[112],"undetectability)":[113],"be":[115],"encoded":[116],"logical":[118],"formulae":[119],"enable":[121],"efficient":[122],"state-of-the-art":[125],"DNN":[126],"verifiers.":[127],"evaluation":[129],"600":[131],"characterizing":[134],"various":[135],"attacker's":[136],"capabilities":[137],"shows":[138],"VSCAN":[139],"matches":[140],"attack":[141],"methods":[142],"in":[143],"finding":[144],"vulnerabilities":[145],"while":[146],"providing":[147],"for":[151],"44%":[152],"--":[155],"significant":[157],"achievement":[158],"given":[159],"complexity":[161],"multi-network":[163],"verification.":[164],"Moreover,":[165],"we":[166],"reveal":[167],"fundamental":[169],"security-efficiency":[170],"tradeoff:":[171],"compact":[172],"16-dimensional":[173],"latent":[174],"spaces":[175],"achieve":[176],"50%":[177],"verified":[178],"compared":[180],"64-dimensional":[182],"spaces.":[183]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-11T00:00:00"}
