{"id":"https://openalex.org/W7131658664","doi":"https://doi.org/10.48550/arxiv.2602.22134","title":"Secure Semantic Communications via AI Defenses: Fundamentals, Solutions, and Future Directions","display_name":"Secure Semantic Communications via AI Defenses: Fundamentals, Solutions, and Future Directions","publication_year":2026,"publication_date":"2026-02-25","ids":{"openalex":"https://openalex.org/W7131658664","doi":"https://doi.org/10.48550/arxiv.2602.22134"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.22134","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.22134","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.22134","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126879564","display_name":"Lan Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhang, Lan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126940424","display_name":"Chengsi Liang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liang, Chengsi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126928136","display_name":"Zeming Zhuang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhuang, Zeming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126932502","display_name":"Yao Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sun, Yao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126941866","display_name":"Fang Fang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fang, Fang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010643450","display_name":"Xiaoyong Yuan","orcid":"https://orcid.org/0000-0003-0782-4187"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuan, Xiaoyong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126861044","display_name":"Dusit Niyato","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Niyato, Dusit","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5126879564"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.769599974155426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.769599974155426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0478999987244606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5795000195503235},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5486999750137329},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.44920000433921814},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43320000171661377},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4034000039100647},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.3944999873638153},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.35120001435279846},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.34779998660087585},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.33390000462532043}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069000244140625},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5795000195503235},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5486999750137329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5328999757766724},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.44920000433921814},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4034000039100647},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.3944999873638153},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.35120001435279846},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.34779998660087585},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.33390000462532043},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.32690000534057617},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29420000314712524},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.29319998621940613},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.29019999504089355},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28850001096725464},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.27720001339912415},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.2702000141143799},{"id":"https://openalex.org/C85407183","wikidata":"https://www.wikidata.org/wiki/Q1045785","display_name":"Semantic network","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.2538999915122986},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.22134","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.22134","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.22134","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.22134","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4990353286266327}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Semantic":[0],"communication":[1,5],"(SemCom)":[2],"redefines":[3],"wireless":[4,115],"from":[6,26],"reproducing":[7],"symbols":[8],"to":[9,29,127,195,207],"transmitting":[10],"task-relevant":[11],"semantics.":[12],"However,":[13],"this":[14,87,185],"AI-native":[15,203],"architecture":[16],"also":[17,149],"introduces":[18],"new":[19],"vulnerabilities,":[20],"as":[21],"semantic":[22,100,113,137,159],"failures":[23],"may":[24],"arise":[25],"adversarial":[27,143],"perturbations":[28],"models,":[30],"corrupted":[31],"training":[32],"data,":[33],"desynchronized":[34],"priors,":[35],"or":[36,140],"misaligned":[37],"inference":[38,83],"even":[39],"when":[40],"lower-layer":[41],"transmission":[42],"reliability":[43],"and":[44,54,73,81,119,142,163,171,174,181,199,206,215],"cryptographic":[45],"protection":[46],"remain":[47],"intact.":[48],"This":[49],"survey":[50,168,186],"provides":[51],"a":[52,91,188],"defense-centered":[53],"system-oriented":[55],"synthesis":[56],"of":[57,94,217],"security":[58,129,151,210],"in":[59,105,178,202,212],"SemCom":[60,106,204,219],"via":[61],"AI":[62],"defense.":[63],"We":[64,148],"analyze":[65],"AI-centric":[66],"threat":[67,198],"models":[68],"by":[69,98],"consolidating":[70],"existing":[71],"studies":[72],"organizing":[74],"attack":[75],"surfaces":[76],"across":[77],"model-level,":[78],"channel-realizable,":[79],"knowledge-based,":[80],"networked":[82],"vectors.":[84],"Building":[85],"on":[86],"foundation,":[88],"we":[89],"present":[90],"structured":[92],"taxonomy":[93],"defense":[95,200],"strategies":[96],"organized":[97],"where":[99],"integrity":[101],"can":[102],"be":[103],"compromised":[104],"systems":[107,205],"despite":[108],"correct":[109],"symbol":[110],"delivery,":[111],"spanning":[112],"encoding,":[114],"transmission,":[116],"knowledge":[117],"integrity,":[118],"coordination":[120],"among":[121,158],"multiple":[122],"agents.":[123],"These":[124],"categories":[125],"correspond":[126],"distinct":[128],"failure":[130],"modes,":[131],"including":[132],"representation":[133],"fragility,":[134],"channel-realizable":[135],"manipulation,":[136],"prior":[138],"poisoning":[139],"desynchronization,":[141],"propagation":[144],"through":[145],"distributed":[146],"inference.":[147],"examine":[150],"utility":[152],"operating":[153],"envelopes":[154],"that":[155,192],"capture":[156],"tradeoffs":[157],"fidelity,":[160],"robustness,":[161],"latency,":[162],"energy":[164],"under":[165],"realistic":[166],"constraints,":[167],"evaluation":[169],"frameworks":[170],"representative":[172],"applications,":[173],"identify":[175],"open":[176],"challenges":[177],"cross-layer":[179],"composition":[180],"deployment-time":[182],"certification.":[183],"Overall,":[184],"offers":[187],"unified":[189],"system-level":[190],"perspective":[191],"enables":[193],"readers":[194],"understand":[196],"major":[197],"mechanisms":[201],"leverage":[208],"emerging":[209],"techniques":[211],"the":[213],"design":[214],"deployment":[216],"robust":[218],"architectures":[220],"for":[221],"next-generation":[222],"intelligent":[223],"networks.":[224]},"counts_by_year":[],"updated_date":"2026-02-27T06:22:10.598206","created_date":"2026-02-27T00:00:00"}
