{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T05:12:25Z","timestamp":1778217145812,"version":"3.51.4"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"5GIC and 6GIC, Institute for Communication Systems (ICS), University of Surrey"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsait.2026.3676713","type":"journal-article","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T20:11:59Z","timestamp":1774296719000},"page":"120-133","source":"Crossref","is-referenced-by-count":0,"title":["Secure Semantic Communication Over Wiretap Channels: Rate-Distortion-Equivocation Tradeoff"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0115-2757","authenticated-orcid":false,"given":"Denis","family":"Kozlov","sequence":"first","affiliation":[{"name":"5GIC and 6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-5820","authenticated-orcid":false,"given":"Mahtab","family":"Mirmohseni","sequence":"additional","affiliation":[{"name":"5GIC and 6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6062-8639","authenticated-orcid":false,"given":"Rahim","family":"Tafazolli","sequence":"additional","affiliation":[{"name":"5GIC and 6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW61385.2024.10807039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3223224"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3477331"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683463"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3191354"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3274122"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITW55543.2023.10160232"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518240"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3194978"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834462"},{"key":"ref12","article-title":"Semantic compression with side information: A rate-distortion perspective","author":"Guo","year":"2022","journal-title":"arXiv:2208.06094"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ITW54588.2022.9965825"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP59255.2023.10355575"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.568694"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557591"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2288256"},{"key":"ref20","article-title":"Task-oriented source coding: Secure transmission, detection","author":"Villard","year":"2011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055508"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866534"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2023.10387242"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.272457"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056749"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541740"},{"key":"ref27","article-title":"Secure lossy source coding for some classes of helper and Gray\u2013Wyner models","author":"Benammar","year":"2017","journal-title":"arXiv:1701.03621"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056588"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057738"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056251"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref33","volume-title":"Information Theory: From Coding To Learning","author":"Polyanskiy","year":"2025"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1561\/0100000036"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref36","first-page":"438","article-title":"Compression of correlated Gaussian sources under individual distortion criteria","volume-title":"Proc. 43rd Annu. Allerton Conf. Commun., Control Comput.","author":"Xiao"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/0471219282.eot142"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313094"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517792"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8700143\/11395188\/11450425.pdf?arnumber=11450425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T05:03:51Z","timestamp":1778216631000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11450425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/jsait.2026.3676713","relation":{},"ISSN":["2641-8770"],"issn-type":[{"value":"2641-8770","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}