{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:34:38Z","timestamp":1775745278606,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["RESTART program PE0000001"],"award-info":[{"award-number":["RESTART program PE0000001"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsac.2026.3669875","type":"journal-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:52:52Z","timestamp":1772571172000},"page":"3782-3797","source":"Crossref","is-referenced-by-count":1,"title":["Secure Goal-Oriented Communication: Defending Against Eavesdropping Timing Attacks"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5681-1695","authenticated-orcid":false,"given":"Federico","family":"Mason","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7915-7275","authenticated-orcid":false,"given":"Federico","family":"Chiariotti","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}]},{"given":"Pietro","family":"Talli","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3671-5190","authenticated-orcid":false,"given":"Andrea","family":"Zanella","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padua, Padua, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3223408"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2919300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3288070"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381967"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3333342"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3516819"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278612"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2200777"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.07.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3608054"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3231039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3432918"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3559152"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813632"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS65812.2025.11152947"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3306851"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3452715"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2025.3526601"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3534562"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2025.3556777"},{"key":"ref23","article-title":"Towards secure semantic communications in the presence of intelligent eavesdroppers","author":"Tang","year":"2025","journal-title":"arXiv:2503.23103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3427713"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3327111"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3411027"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104181"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2418194"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2382592"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24098-5_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.02.037"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2011.2106775"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2604222"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147235"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.09.001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.03.041"},{"key":"ref38","first-page":"15650","article-title":"Reinforcement learning with state observation costs in action-contingent noiselessly observable Markov decision processes","volume-title":"Proc. 35th Int. Conf. Neural Inf. Process. Syst. (NeurIPS)","volume":"34","author":"Nam"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316471104"},{"key":"ref40","volume-title":"Rollout, Policy Iteration, and Distributed Reinforcement Learning","author":"Bertsekas","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2022.103838"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-023-00519-6"},{"key":"ref43","first-page":"330","article-title":"A proof of the equivalence of the programming problem and the game problem","volume-title":"Activity Analysis of Production and Allocation","author":"Dantzig","year":"1951"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1949.10483310"},{"key":"ref45","article-title":"Privacy-preserving semantic communication over wiretap channels with learnable differential privacy","author":"Chen","year":"2025","journal-title":"arXiv:2510.23274"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11372474\/11419090.pdf?arnumber=11419090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:24:12Z","timestamp":1773120252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11419090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/jsac.2026.3669875","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}