{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,11]],"date-time":"2025-05-11T04:01:41Z","timestamp":1746936101136,"version":"3.40.5"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["NS2024055"],"award-info":[{"award-number":["NS2024055"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62061146002"],"award-info":[{"award-number":["62061146002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20222012"],"award-info":[{"award-number":["BK20222012"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978577","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Semantic Viruses: How to Destroy a Task Oriented Semantic Communication Network"],"prefix":"10.1109","author":[{"given":"Heng","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,China"}]},{"given":"Feifei","family":"Song","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,China"}]},{"given":"Kun","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2024.3364990"},{"key":"ref2","article-title":"Generative ai meets semantic communication: Evolution and revolution of communication tasks","author":"Grassucci","year":"2024","journal-title":"arXiv preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3411027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2200547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref8","article-title":"Towards demystifying membership inference attacks","author":"Truex","year":"2018","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3381222"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3263909"},{"key":"ref11","article-title":"Neural discrete representation learning","author":"Van","year":"2017","journal-title":"NIPS"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978577.pdf?arnumber=10978577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:28:34Z","timestamp":1746858514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978577","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}