{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T20:50:58Z","timestamp":1775767858462,"version":"3.50.1"},"reference-count":269,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62571193"],"award-info":[{"award-number":["62571193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62331022"],"award-info":[{"award-number":["62331022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong program","award":["2023QN10X446"],"award-info":[{"award-number":["2023QN10X446"]}]},{"name":"Guangdong program","award":["2023ZT10X148"],"award-info":[{"award-number":["2023ZT10X148"]}]},{"name":"GJYC program of Guangzhou","award":["2024D01J0079"],"award-info":[{"award-number":["2024D01J0079"]}]},{"name":"GJYC program of Guangzhou","award":["2024D03J0006"],"award-info":[{"award-number":["2024D03J0006"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2025-00561467"],"award-info":[{"award-number":["RS-2025-00561467"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004395","name":"Institute of Information & Communications Technology Planning & Evaluation","doi-asserted-by":"publisher","award":["RS-2024-00360387"],"award-info":[{"award-number":["RS-2024-00360387"]}],"id":[{"id":"10.13039\/501100004395","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ZENITH Research and Leadership Career Development Fund","award":["ID23.01"],"award-info":[{"award-number":["ID23.01"]}]},{"name":"EU COST Action 6G-PHYSEC"},{"DOI":"10.13039\/501100001729","name":"Swedish Foundation for Strategic Research","doi-asserted-by":"publisher","award":["ID24-0087"],"award-info":[{"award-number":["ID24-0087"]}],"id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Research, Technology and Space (BMFTR) 6GEM+ Transfer Hub","award":["16KIS2412"],"award-info":[{"award-number":["16KIS2412"]}]},{"name":"German Federal Ministry of Research, Technology and Space (BMFTR) 6GEM+ Transfer Hub","award":["16KISS005"],"award-info":[{"award-number":["16KISS005"]}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/X030806\/1"],"award-info":[{"award-number":["EP\/X030806\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Y028732\/1"],"award-info":[{"award-number":["EP\/Y028732\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"EU Horizon program","doi-asserted-by":"publisher","award":["101139232"],"award-info":[{"award-number":["101139232"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsac.2026.3673450","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:50:21Z","timestamp":1774554621000},"page":"4444-4470","source":"Crossref","is-referenced-by-count":0,"title":["Secure Communications, Sensing, and Computing Toward Next-Generation Networks"],"prefix":"10.1109","volume":"44","author":[{"given":"Ruiqi","family":"Liu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, China"}]},{"given":"Beixiong","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Microelectronics, South China University of Technology, Guangzhou, China"}]},{"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea"}]},{"given":"Si-Hyeon","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"}]},{"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, &#x00C9;cole de Technologie Sup&#x00E9;rieure, Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada"}]},{"given":"Onur","family":"G\u00fcnl\u00fc","sequence":"additional","affiliation":[{"name":"Lehrstuhl f&#x00FC;r Nachrichtentechnik, Technische Universit&#x00E4;t Dortmund, Dortmund, Germany"}]},{"given":"Deniz","family":"G\u00fcnd\u00fcz","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Imperial College London, London, U.K."}]}],"member":"263","reference":[{"key":"ref1","volume-title":"M.2160: Framework and Overall Objectives of the Future Development of IMT for 2030 and Beyond","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/b12078"},{"key":"ref3","volume-title":"Security Architecture and Procedures for 5G System","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC58020.2023.10183184"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2025.3557403"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2025.3532887"},{"key":"ref7","volume-title":"Study on Evolution of Cellular Internet of Things (CIoT) Security for the 5G System","year":"2020"},{"key":"ref8","volume-title":"Study on Security for Enhanced Support of Industrial Internet of Things (IIoT)","year":"2022"},{"key":"ref9","volume-title":"Study on Mission Critical Security Enhancements","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2024.2329985"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3223408"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107930","article-title":"6G networks: Beyond Shannon towards semantic and goal-oriented communications","volume":"190","author":"Calvanese Strinati","year":"2021","journal-title":"Comput. Netw."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.106.2100636"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262112"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2919300"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3477331"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Fall57202.2022.10012971"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC62479.2024.10681697"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM55648.2025.11044671"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2023.0021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC58020.2023.10182512"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3362515"},{"key":"ref27","article-title":"Integrating sensing and communications in 6G? Not until it is secure to do so","author":"Su","year":"2025","journal-title":"arXiv:2503.15243"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2023.3275048"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2100972"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417324"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2026.3670825"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-2501-8_17"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2400042"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2068852"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523727"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2006422"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797670"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2431992"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2493063"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2298132"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2315801"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2411260"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2618725"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2623795"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2866146"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3083409"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2026.3672230"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2025.3611919"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2025.3622912"},{"key":"ref55","article-title":"Rotatable antenna-empowered wireless networks: A tutorial","author":"Zheng","year":"2026","journal-title":"arXiv:2603.25559"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2025.3593258"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900028"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3443453"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.103.2000636"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2611483"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2789223"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2472527"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548471"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2530089"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2930484"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3190477"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878398"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013213"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3011895"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.905002"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3045132"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970786"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2421477"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2720736"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818650"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3067386"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3297320"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3011191"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2928949"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3263921"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3082779"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109746"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088667"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3112121"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3396793"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3201319"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3286120"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288641"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3542959"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3386597"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3383868"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3244993"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3234338"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2984751"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238573"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3280040"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3367362"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3213593"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2535442"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3045305"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA.2019.8873460"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS50536.2020.9310070"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971260"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.294"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2967393"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1080\/09500340008244058"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3144219"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12044"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12069"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3333342"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213571"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1499586.1499731"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056749"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970882"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849330"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3053432"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2903658"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313115"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4594958"},{"key":"ref130","first-page":"368","article-title":"The information bottleneck method","volume-title":"Proc. 37th Annu. Allerton Conf. Commun., Control Comput.","author":"Tishby"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2878698"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919758"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866936"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2848659"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013200"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053216"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747068"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2025.3564907"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278612"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2022.3231042"},{"key":"ref144","article-title":"Rate-distortion-perception trade-off with strong realism constraints: Role of side information and common randomness","author":"Hamdi","year":"2025","journal-title":"arXiv:2507.14825"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MBITS.2023.3322667"},{"key":"ref146","first-page":"1","article-title":"Learning to communicate with deep multi-agent reinforcement learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Foerster"},{"key":"ref147","first-page":"7265","article-title":"Learning attentional communication for multi-agent cooperation","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Jiang"},{"key":"ref148","article-title":"Social influence as intrinsic motivation for multi-agent deep reinforcement learning","author":"Jaques","year":"2018","journal-title":"arXiv:1810.08647"},{"key":"ref149","first-page":"1538","article-title":"TarMAC: Targeted multi-agent communication","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Das"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087248"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065072"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3559152"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2026.3669875"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8815129"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.3182\/20110828-6-IT-1002.01721"},{"key":"ref157","first-page":"7","article-title":"False data injection attacks in control systems","volume-title":"Proc. 1st workshop Secure Control Syst.","author":"Mo"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2570003"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7525077"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2565379"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3342637"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT63088.2025.11195349"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"ref165","article-title":"RF sensing security and malicious exploitation: A comprehensive survey","author":"Han","year":"2025","journal-title":"arXiv:2504.10969"},{"key":"ref166","article-title":"A survey of wireless sensing security from a role-based view: Victim, weapon, and shield","author":"Geng","year":"2024","journal-title":"arXiv:2412.03064"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2025.3641236"},{"issue":"8","key":"ref168","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Def. Con."},{"key":"ref169","volume-title":"Introduction to Radar Systems","author":"O\u2019Donnell","year":"2007"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3115804"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24153"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359567"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/CNS62487.2024.10735492"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179371"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2024.052112"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.3390\/s25061913"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.2400129"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3390621"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3120602"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3479729"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528536"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616661"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3159108"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850287"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2000082"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.3390\/app11062819"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.compositesb.2017.05.005"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2024.3420149"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2024.3378455"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2025.3549892"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2011.5937280"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2023.3305187"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2024.3442559"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560698"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3580890"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649367"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104149"},{"issue":"11","key":"ref199","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3182416"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3062755"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3091684"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111140"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3560034"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2756959"},{"key":"ref206","first-page":"4406","article-title":"Polynomial codes: An optimal design for high-dimensional coded matrix multiplication","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Yu"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3158868"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3142355"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC60668.2024.10694545"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2025.3569733"},{"key":"ref211","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref212","first-page":"1","article-title":"Practical secure aggregation for federated learning on user-held data","volume-title":"Proc. NIPS Workshop Private Multi-Party Mach. Learn.","author":"Bonawitz"},{"key":"ref213","article-title":"Private federated learning in gboard","author":"Zhang","year":"2023","journal-title":"arXiv:2306.14793"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref215","first-page":"7680","article-title":"Optimal compression of locally differentially private mechanisms","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Shah"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2025.3542896"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2981904"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2974748"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174426"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322199"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036948"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413624"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT63088.2025.11195630"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2725272"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS61860.2024.10810724"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT63088.2025.11195680"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2279330"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3439440"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2019.00128"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025441"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796791"},{"key":"ref234","article-title":"Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing","author":"Shi","year":"2020","journal-title":"arXiv:2007.08363"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/SSP49050.2021.9513738"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771899"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111024"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927376"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838452"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089601"},{"key":"ref243","article-title":"Adversarial attacks in integrated sensing and communication systems","author":"Liu","year":"2023","journal-title":"IEEE Trans. Wireless Commun."},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3054066"},{"key":"ref245","article-title":"Physical adversarial attacks on radar sensors for autonomous driving","author":"Chen","year":"2023","journal-title":"arXiv:2303.10392"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205184"},{"key":"ref247","article-title":"AI security in 6G: Adversarial attacks on cross-layer ISAC architectures","author":"Zhang","year":"2023","journal-title":"arXiv:2304.00594"},{"key":"ref248","article-title":"Adversarial machine learning in wireless communications: A review and open issues","author":"Bair","year":"2022","journal-title":"arXiv:2204.04359"},{"issue":"1","key":"ref249","first-page":"44","article-title":"Model-based deep learning for wireless communications","volume":"38","author":"Shlezinger","year":"2021","journal-title":"IEEE Signal Process. Mag."},{"issue":"12","key":"ref250","first-page":"1984","article-title":"Federated learning over wireless networks: Optimization model design and analysis","volume":"109","author":"Li","year":"2021","journal-title":"Proc. IEEE"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref252","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"arXiv:1412.6572"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref254","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Cohen"},{"key":"ref255","first-page":"5286","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"Proc. ICML","author":"Wong"},{"key":"ref256","article-title":"Adversarial robustness in wireless AI: Cross-layer perspectives","author":"Shi","year":"2023","journal-title":"IEEE Wireless Commun."},{"key":"ref257","first-page":"1","article-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks","volume-title":"Proc. ICLR","author":"Hendrycks"},{"key":"ref258","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","volume-title":"Proc. ICLR","author":"Ma"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref260","first-page":"1","article-title":"Countering adversarial images using input transformations","volume-title":"Proc. ICLR","author":"Guo"},{"key":"ref261","first-page":"1","article-title":"Stochastic activation pruning for robust adversarial defense","volume-title":"Proc. ICLR","author":"Dhillon"},{"key":"ref262","first-page":"1","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","volume-title":"Proc. ICLR","author":"Samangouei"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref264","article-title":"Robust beamforming design against adversarial attacks in 6G MIMO systems","author":"Park","year":"2022","journal-title":"IEEE Trans. Wireless Commun."},{"key":"ref265","first-page":"3640","article-title":"Towards secure end-to-end learning-based communication systems under adversarial attacks","volume":"16","author":"Shafiee","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref266","article-title":"Layered defense for ai-empowered 6G wireless networks against adversarial attacks","author":"Zhang","year":"2023","journal-title":"arXiv:2305.09234"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3580286"},{"key":"ref268","first-page":"301","article-title":"The limitations of federated learning in Sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Fung"},{"key":"ref269","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bhagoji"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11372474\/11456831.pdf?arnumber=11456831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:46:15Z","timestamp":1775763975000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11456831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":269,"URL":"https:\/\/doi.org\/10.1109\/jsac.2026.3673450","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}