File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2025.3570202
- Scopus: eid_2-s2.0-105005293503
- Find via

Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Generative AI Based Secure Wireless Sensing for ISAC Networks
| Title | Generative AI Based Secure Wireless Sensing for ISAC Networks |
|---|---|
| Authors | |
| Keywords | Generative AI integrated sensing and communication wireless sensing security |
| Issue Date | 1-Jan-2025 |
| Publisher | Institute of Electrical and Electronics Engineers |
| Citation | IEEE Transactions on Information Forensics and Security, 2025, v. 20, p. 5195-5210 How to Cite? |
| Abstract | Integrated sensing and communications (ISAC) is one of the crucial technologies for 6G, and channel state information (CSI) based sensing serves as an essential part of ISAC. However, current research on ISAC focuses mainly on improving sensing performance, overlooking security issues, particularly the unauthorized sensing of users. Hence, this paper proposes a diffusion model based secure sensing system (DFSS). Specifically, we first propose a discrete conditional diffusion model to generate graphs with nodes and edges, which guides the ISAC system to appropriately activate wireless links and nodes, ensuring the sensing performance while minimizing the operation cost. Using the activated links and nodes, DFSS then employs the continuous conditional diffusion model to generate safeguarding signals, which are next modulated onto the pilot at the transmitter to mask fluctuations caused by user activities. As such, only authorized ISAC devices with the safeguarding signals can extract the true CSI for sensing, while unauthorized devices are unable to perform the effective sensing. Experiment results demonstrate that DFSS can reduce the activity recognition accuracy of the unauthorized devices by approximately 70%, effectively shield the user from the illegitimate surveillance. |
| Persistent Identifier | http://hdl.handle.net/10722/362171 |
| ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Wang, Jiacheng | - |
| dc.contributor.author | Du, Hongyang | - |
| dc.contributor.author | Liu, Yinqiu | - |
| dc.contributor.author | Sun, Geng | - |
| dc.contributor.author | Niyato, Dusit | - |
| dc.contributor.author | Mao, Shiwen | - |
| dc.contributor.author | In Kim, Dong | - |
| dc.contributor.author | Shen, Xuemin | - |
| dc.date.accessioned | 2025-09-19T00:33:28Z | - |
| dc.date.available | 2025-09-19T00:33:28Z | - |
| dc.date.issued | 2025-01-01 | - |
| dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2025, v. 20, p. 5195-5210 | - |
| dc.identifier.issn | 1556-6013 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/362171 | - |
| dc.description.abstract | Integrated sensing and communications (ISAC) is one of the crucial technologies for 6G, and channel state information (CSI) based sensing serves as an essential part of ISAC. However, current research on ISAC focuses mainly on improving sensing performance, overlooking security issues, particularly the unauthorized sensing of users. Hence, this paper proposes a diffusion model based secure sensing system (DFSS). Specifically, we first propose a discrete conditional diffusion model to generate graphs with nodes and edges, which guides the ISAC system to appropriately activate wireless links and nodes, ensuring the sensing performance while minimizing the operation cost. Using the activated links and nodes, DFSS then employs the continuous conditional diffusion model to generate safeguarding signals, which are next modulated onto the pilot at the transmitter to mask fluctuations caused by user activities. As such, only authorized ISAC devices with the safeguarding signals can extract the true CSI for sensing, while unauthorized devices are unable to perform the effective sensing. Experiment results demonstrate that DFSS can reduce the activity recognition accuracy of the unauthorized devices by approximately 70%, effectively shield the user from the illegitimate surveillance. | - |
| dc.language | eng | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
| dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
| dc.subject | Generative AI | - |
| dc.subject | integrated sensing and communication | - |
| dc.subject | wireless sensing security | - |
| dc.title | Generative AI Based Secure Wireless Sensing for ISAC Networks | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1109/TIFS.2025.3570202 | - |
| dc.identifier.scopus | eid_2-s2.0-105005293503 | - |
| dc.identifier.volume | 20 | - |
| dc.identifier.spage | 5195 | - |
| dc.identifier.epage | 5210 | - |
| dc.identifier.eissn | 1556-6021 | - |
| dc.identifier.issnl | 1556-6013 | - |
