{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:47:57Z","timestamp":1774540077739,"version":"3.50.1"},"reference-count":44,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065362","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T03:49:14Z","timestamp":1747972154000},"page":"2865-2882","source":"Crossref","is-referenced-by-count":1,"title":["Semantic Secure Communication Based on the Joint Source-Channel Coding"],"prefix":"10.32604","volume":"84","author":[{"given":"Yifeng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuer","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianxiang","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Peiya","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"ICC 2023\u2014IEEE International Conference on Communications","first-page":"5620","article-title":"Deep joint source-channel and encryption coding: secure semantic communications","author":"Tung","year":"2023 May 28\u2013Jun 1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/MWC.017.2100705","article-title":"Communication beyond transmitting bits: semantics-guided source and channel coding","volume":"30","author":"Dai","year":"2022","journal-title":"IEEE Wirel Commun"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"38521","DOI":"10.1109\/JIOT.2024.3448538","article-title":"Semantic-aware spectrum sharing in internet of vehicles based on deep reinforcement learning","volume":"11","author":"Shao","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref4","first-page":"1019","article-title":"Secure communication scheme based on a new hyperchaotic system","volume":"73","author":"Benkouider","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref5","article-title":"A survey on semantic communication networks: architecture, security, and privacy","author":"Guo","year":"2024; early access","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref6","article-title":"Resource management, security, and privacy issues in semantic communications: a survey","author":"Won","year":"2024; early access","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.comcom.2023.12.022","article-title":"VeriBypasser: an automatic image verification code recognition system based on CNN","volume":"217","author":"Ding","year":"2024","journal-title":"Comput Commun"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"e13658","DOI":"10.1111\/exsy.13658","article-title":"ImageVeriBypasser: an image verification code recognition approach based on Convolutional Neural Network","volume":"41","author":"Ji","year":"2024","journal-title":"Expert Syst"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"109977","DOI":"10.1016\/j.compeleceng.2024.109977","article-title":"Semantic-based defense mechanism for AI model networks using rich semantic identifier mapping","volume":"122","author":"Ba","year":"2025","journal-title":"Comput Electr Eng"},{"key":"ref10","series-title":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"AI in combatting man-in-the-middle attacks: a comprehensive review","author":"Mohamed","year":"2024"},{"key":"ref11","first-page":"2971","article-title":"Entropy-bottleneck-based privacy protection mechanism for semantic communication","volume":"83","author":"Han","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1109\/LSP.2021.3072278","article-title":"Joint source-channel coding for semantics-aware grant-free radio access in IoT fog networks","volume":"28","author":"Dommel","year":"2021","journal-title":"IEEE Signal Proces Lett"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1109\/JSAC.2023.3288243","article-title":"Generative joint source-channel coding for semantic image transmission","volume":"41","author":"Erdemir","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"5225","DOI":"10.1109\/TCOMM.2022.3180997","article-title":"Deep source-channel coding for sentence semantic transmission with HARQ","volume":"70","author":"Jiang","year":"2022","journal-title":"IEEE Transact Communicat"},{"key":"ref15","first-page":"3215","article-title":"Audio-text multimodal speech recognition via dual-tower architecture for mandarin air traffic control communications","volume":"78","author":"Ge","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref16","first-page":"1","article-title":"Adaptive stepsize forward-backward pursuit and acoustic emission-based health state assessment of high-speed train bearings","volume":"24","author":"Han","year":"2024","journal-title":"Struct Health Monit"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/JSAC.2022.3180802","article-title":"Nonlinear transform source-channel coding for semantic communications","volume":"40","author":"Dai","year":"2022","journal-title":"IEEE J Select Areas Communicat"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/TON.2025.3526148","article-title":"Prioritized information bottleneck theoretic framework with distributed online learning for edge video analytics","author":"Fang","year":"2025","journal-title":"IEEE Trans Netw"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1109\/JSAC.2023.3288246","article-title":"Toward adaptive semantic communications: efficient data transmission via online learned nonlinear transform source-channel coding","volume":"41","author":"Dai","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"104908","DOI":"10.1016\/j.dsp.2024.104908","article-title":"Development and future of compression-combined digital image encryption: a literature review","volume":"158","author":"Lin","year":"2024","journal-title":"Digit Signal Process"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.comcom.2023.06.019","article-title":"A secure physical health test data sharing scheme based on token distribution and programmable blockchains","volume":"209","author":"Wang","year":"2023","journal-title":"Comput Commun"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"Zhong X, Sham C-W, Ma SL, Chou H-F, Mostaani A, Vu TX, et al. Joint source-channel coding system for 6G communication: design, prototype and future directions. arXiv:2310.01024. 2023.","DOI":"10.1109\/ACCESS.2024.3360003"},{"key":"ref23","series-title":"2023 IEEE\/CIC International Conference on Communications in China (ICCC)","first-page":"1","article-title":"Transformer-based joint source channel coding for textual semantic communication","author":"Liu","year":"2023 Aug 10\u201312"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/MWC.013.2100642","article-title":"Rethinking modern communication from semantic coding to semantic communication","volume":"30","author":"Lu","year":"2022","journal-title":"IEEE Wirel Commun"},{"key":"ref25","series-title":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","first-page":"972","article-title":"A scheme of steganography and transmission based on AMR-WB fixed codebook","author":"Zheng","year":"2022 Dec 9\u201312"},{"key":"ref26","volume":"981","author":"Jyothi","year":"2020","journal-title":"IOP conference series: materials science and engineering"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/3-540-36978-3_11","author":"Gastpar","year":"2003","journal-title":"Information processing in sensor networks"},{"key":"ref28","unstructured":"Divsalar D, Pollara F. On the design of turbo codes. In: The telecommunications and data acquisition progress report 42-123. Washington, DC, USA: NASA; 1995."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.24138\/jcomss.v2i3.283","article-title":"Design of LDPC codes: a survey and new results","volume":"2","author":"Liva","year":"2006","journal-title":"J Commun Soft Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/COMST.2014.2361754","article-title":"A survey on FEC codes for 100 G and beyond optical networks","volume":"18","author":"Tzimpragos","year":"2014","journal-title":"IEEE Communicat Surv Tutor"},{"key":"ref31","series-title":"Proceedings of ICT Mobile Summit","first-page":"1","article-title":"Performance evaluation of non-binary LDPC codes on wireless channels","author":"Pfletschinger","year":"2009 Jun 10\u201312"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1007\/s11235-019-00630-3","article-title":"A survey on channel coding techniques for 5G wireless networks","volume":"73","author":"Arora","year":"2020","journal-title":"Telecommun Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2643205","DOI":"10.1155\/2018\/2643205","article-title":"Error control codes for next-generation communication systems: opportunities and challenges","volume":"2018","author":"Fei","year":"2018","journal-title":"Wirel Commun Mob Comput"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/1-4020-3685-X_11","author":"Barbulescu","year":"2005","journal-title":"Turbo code applications: a journey from a paper to realization"},{"key":"ref35","series-title":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","first-page":"1","article-title":"Design of check-hybrid LDPC codes for data communications over helicopter-satellite channels","author":"Wang","year":"2017 Sep 24\u201327"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/1-4020-3685-X_12","author":"Valenti","year":"2005","journal-title":"Turbo code applications"},{"key":"ref37","series-title":"ATSC Symposium on Next Generation Broadcast Television","article-title":"Latest trends in worldwide digital terrestrial broadcasting and application to the next generation broadcast television physical layer","author":"Michael","year":"2010"},{"key":"ref38","first-page":"4417","article-title":"A holistic secure communication mechanism using a multilayered cryptographic protocol to enhanced security","volume":"78","author":"Wang","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref39","first-page":"191","author":"Cover","year":"1991","journal-title":"Elements of information theory"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"20252","DOI":"10.1364\/OE.22.020252","article-title":"Binary phase-shift keying by coupling modulation of microrings","volume":"22","author":"Sacher","year":"2014","journal-title":"Optics Express"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/26.24595","article-title":"Quadrature-quadrature phase-shift keying","volume":"37","author":"Saha","year":"1989","journal-title":"IEEE Transact Commun"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"57","DOI":"10.4302\/plp.v10i2.809","article-title":"Coherent 16 quadrature amplitude modulation (16 QAM) optical communication systems","volume":"10","author":"El-Nahal","year":"2018","journal-title":"Photonics Lett Poland"},{"key":"ref43","unstructured":"Yao H, Wang J, Dai P, Bo L, Chen Y. An efficient and robust system for vertically federated random forest. arXiv:2201.10761. 2022."},{"key":"ref44","series-title":"Informatics Engineering and Information Science: International Conference, ICIEIS 2011","first-page":"185","article-title":"On the affine ciphers in cryptography","author":"Kazemi","year":"2011 Nov 12\u201314"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65362\/TSP_CMC_65362.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:51:57Z","timestamp":1763344317000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065362","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}