Performance Limits of a Deep Learning-Enabled Text Semantic Communication under Interference DOI
Tilahun M. Getu, Walid Saad, Georges Kaddoum

et al.

IEEE Transactions on Wireless Communications, Journal Year: 2024, Volume and Issue: 23(8), P. 10213 - 10228

Published: Aug. 1, 2024

Although deep learning (DL)-enabled semantic communication (SemCom) has emerged as a 6G enabler by minimizing irrelevant information transmission – power usage, bandwidth consumption, and delay, its benefits can be limited radio frequency interference (RFI) that causes substantial noise. Such noise's impact alleviated using an interference-resistant robust (IR 2 ) SemCom design, though no such design exists yet. To stimulate fundamental research on IR SemCom, the performance limits of popular text system named DeepSC are studied in presence (multi-interferer) RFI. By introducing principled probabilistic framework for we show DeepSC produces semantically sentences RFI gets very large. We also derive DeepSC's practical lower bound outage probability under multi-interferer RFI, propose (generic) lifelong DL-based system. corroborate derived with simulations computer experiments, which affirm vulnerability to wireless attack

Language: Английский

Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems DOI
Bui Duc Son, Tiến Hoa Nguyễn, Trinh Van Chien

et al.

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(11), P. 19168 - 19187

Published: March 6, 2024

The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G) networks due dense connectivity, ultra-reliability, low latency, high throughput. Artificial intelligence, including deep learning machine learning, offers solutions for optimizing deploying cutting-edge technologies future radio communications. However, these techniques vulnerable adversarial attacks, leading degraded performance erroneous predictions, outcomes unacceptable ubiquitous networks. This survey extensively addresses attacks defense methods in 6G network-assisted systems. theoretical background up-to-date research on defenses discussed. Furthermore, we provide Monte Carlo simulations validate the effectiveness compared jamming attacks. Additionally, examine vulnerability by demonstrating attack strategies applicable technologies, reconfigurable intelligent surfaces, multiple-input multiple-output (MIMO)/cell-free MIMO, satellites, metaverse, semantic Finally, outline challenges developments associated with

Language: Английский

Citations

9

Joint communication and computation design for secure integrated sensing and semantic communication system DOI
Jianxin Dai, Hui Fan, Zhouxiang Zhao

et al.

Science China Information Sciences, Journal Year: 2025, Volume and Issue: 68(3)

Published: Feb. 11, 2025

Language: Английский

Citations

1

Exploring Attention-Aware Network Resource Allocation for Customized Metaverse Services DOI
Hongyang Du, Jiacheng Wang, Dusit Niyato

et al.

IEEE Network, Journal Year: 2022, Volume and Issue: 37(6), P. 166 - 175

Published: Dec. 26, 2022

Emerging with the support of computing and communications technologies, Metaverse is expected to bring users unprecedented service experiences. However, increase in number places a heavy demand on network resources, especially for services that are based graphical extended reality require rendering plethora virtual objects. To make efficient use resources improve Quality-of-Experience (QoE), we design an attentionaware resource allocation scheme achieve customized services. The aim allocate more objects which interested. We first discuss several key techniques related services, including QoE analysis, eye-tracking, remote rendering. then review existing datasets propose user-objectattention level (UOAL) dataset contains ground truth attention 30 96 1; 000 images. With help UOAL, attention-aware algorithm has two steps, i.e., prediction maximization. Specially, provide overview designs types methods, interestaware time-aware prediction. By using predicted userobject- values, such as capacity edge devices can be allocated optimally maximize QoE. Finally, promising research directions

Language: Английский

Citations

34

A Blockchain-Based Semantic Exchange Framework for Web 3.0 Toward Participatory Economy DOI

Yijing Lin,

Zhipeng Gao, Yaofeng Tu

et al.

IEEE Communications Magazine, Journal Year: 2023, Volume and Issue: 61(8), P. 94 - 100

Published: June 5, 2023

Web 3.0 is the next-generation Internet that enables participants to read, write, and own contents in a decentralized manner. It mainly driven by blockchain, semantic communication, edge computing, artificial intelligence, which can construct value networks achieve participatory economics based on decision making. capture characteristics of extraction, communication sharing transfer information precisely. However, current solutions focus blockchain while overlooking other new technologies' roles 3.0. To further unleash advantages extraction 3.0, this article, we propose blockchain-based exchange framework realize fair efficient interactions. In framework, first attempt tokenize into Non-Fungible Token (NFT) for exchange. Then utilize Stackelberg game maximize buying pricing strategies trading. We also leverage Zero-Knowledge Proof share authentic without publishing it before receiving payments, privacy-preserving trading compared with NFT marketplaces. A case study about urban planning given show clearly proposed mechanisms. Finally, several challenges opportunities are identified.

Language: Английский

Citations

20

Performance Limits of a Deep Learning-Enabled Text Semantic Communication under Interference DOI
Tilahun M. Getu, Walid Saad, Georges Kaddoum

et al.

IEEE Transactions on Wireless Communications, Journal Year: 2024, Volume and Issue: 23(8), P. 10213 - 10228

Published: Aug. 1, 2024

Although deep learning (DL)-enabled semantic communication (SemCom) has emerged as a 6G enabler by minimizing irrelevant information transmission – power usage, bandwidth consumption, and delay, its benefits can be limited radio frequency interference (RFI) that causes substantial noise. Such noise's impact alleviated using an interference-resistant robust (IR 2 ) SemCom design, though no such design exists yet. To stimulate fundamental research on IR SemCom, the performance limits of popular text system named DeepSC are studied in presence (multi-interferer) RFI. By introducing principled probabilistic framework for we show DeepSC produces semantically sentences RFI gets very large. We also derive DeepSC's practical lower bound outage probability under multi-interferer RFI, propose (generic) lifelong DL-based system. corroborate derived with simulations computer experiments, which affirm vulnerability to wireless attack

Language: Английский

Citations

7