Semantic Camouflage Communications Using Defensive Adversarial Attack: Conceal Truth while Show Fake

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper introduces defensive adversarial attacks aimed at enhancing the security of semantic communication systems by confusing potential eavesdroppers. Existing research predominantly focuses on enhancing the accuracy of semantic communications while neglecting the security vulnerabilities posed by eavesdroppers. In this study, from the standpoint of physical layer security, defensive adversarial attacks are employed to introduce artificial noise into semantic communications, effectively concealing real information. This artificial noise is generated by deep neural networks to mislead eavesdroppers into perceiving the content of images as unrelated information, with little probability of disrupting normal semantic communications. Experimental results demonstrate that the proposed model can selectively mislead the decoding efforts of eavesdroppers, while ensuring uninterrupted decoding by legitimate receivers.

Original languageEnglish
Title of host publicationGLOBECOM 2024 - 2024 IEEE Global Communications Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4988-4993
Number of pages6
ISBN (Electronic)9798350351255
DOIs
StatePublished - 2024
Event2024 IEEE Global Communications Conference, GLOBECOM 2024 - Cape Town, South Africa
Duration: 8 Dec 202412 Dec 2024

Publication series

NameProceedings - IEEE Global Communications Conference, GLOBECOM
ISSN (Print)2334-0983
ISSN (Electronic)2576-6813

Conference

Conference2024 IEEE Global Communications Conference, GLOBECOM 2024
Country/TerritorySouth Africa
CityCape Town
Period8/12/2412/12/24

Keywords

  • Semantic communications
  • camouflage
  • defen-sive adversarial attack
  • physical layer security

Fingerprint

Dive into the research topics of 'Semantic Camouflage Communications Using Defensive Adversarial Attack: Conceal Truth while Show Fake'. Together they form a unique fingerprint.

Cite this