{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:18:33Z","timestamp":1774419513375,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10888762","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:19Z","timestamp":1741799719000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["SCF-Stega: Controllable Linguistic Steganography Based on Semantic Communications Framework"],"prefix":"10.1109","author":[{"given":"Yilin","family":"Long","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]},{"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]},{"given":"Zhuang","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]},{"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[{"name":"Guangzhou University,School of Artificial Intelligence,Guangzhou,China"}]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Electronic Engineering,Beijing,China"}]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2015.33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7355562"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12053"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3773-3_56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.091"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2016.09.029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.08.004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.713357"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CICT.2016.34"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1313-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.025082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d19-1115"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.268"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179287"},{"issue":"1","key":"ref18","first-page":"2","article-title":"Intellicise communication system: model-driven semantic communications","volume":"29","author":"Zhang","year":"2022","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200099"},{"key":"ref20","article-title":"Semantic communications: principles and challenges","author":"Qin","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2024.10606406"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44696-2_39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-acl.272"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1360"},{"issue":"140","key":"ref25","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"Journal of Machine Learning Research"},{"key":"ref26","article-title":"Graph-Stega: Semantic controllable steganographic text generation guided by knowledge graph","author":"Yang","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/w14-3348"},{"key":"ref28","first-page":"74","article-title":"ROUGE: A package for automatic evaluation of summaries","volume-title":"Text Summarization Branches Out","author":"Lin","year":"2004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"ref30","volume-title":"Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition","author":"Jurafsky","year":"2000"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2019.2902095"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2019.2895286"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2019.2953953"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10888762.pdf?arnumber=10888762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:23:15Z","timestamp":1774416195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10888762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10888762","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}