A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction
arXiv:2503.23866v3 Announce Type: replace-cross Abstract: This paper investigates backdoor attacks in image-oriented semantic communications. The threat of backdoor attacks on symbol reconstruction in semantic communication (SemCom) systems has received limited attention. Previous research on backdoor attacks targeting SemCom symbol reconstruction primarily focuses on input-level triggers, which are impractical in scenarios with strict input constraints. In this paper, we propose a novel channel-triggered backdoor attack (CT-BA) framework that exploits inherent wireless channel characteristics — Jialin Wan (Sherman), Jinglong Shen (Sherman), Nan Cheng (Sherman), Zhisheng Yin (Sherman), Yiliang Liu (Sherman), Wenchao Xu (Sherman), Xuemin (Sherman), Shen
View PDF HTML (experimental)
Abstract:This paper investigates backdoor attacks in image-oriented semantic communications. The threat of backdoor attacks on symbol reconstruction in semantic communication (SemCom) systems has received limited attention. Previous research on backdoor attacks targeting SemCom symbol reconstruction primarily focuses on input-level triggers, which are impractical in scenarios with strict input constraints. In this paper, we propose a novel channel-triggered backdoor attack (CT-BA) framework that exploits inherent wireless channel characteristics as activation triggers. Our key innovation involves utilizing fundamental channel statistics parameters, specifically channel gain with different fading distributions or channel noise with different power, as potential triggers. This approach enhances stealth by eliminating explicit input manipulation, provides flexibility through trigger selection from diverse channel conditions, and enables automatic activation via natural channel variations without adversary intervention. We extensively evaluate CT-BA across four joint source-channel coding (JSCC) communication system architectures and three benchmark datasets. Simulation results demonstrate that our attack achieves near-perfect attack success rate (ASR) while maintaining effective stealth. Finally, we discuss potential defense mechanisms against such attacks.
Subjects:
Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Cite as: arXiv:2503.23866 [cs.CR]
(or arXiv:2503.23866v3 [cs.CR] for this version)
https://doi.org/10.48550/arXiv.2503.23866
arXiv-issued DOI via DataCite
Submission history
From: Jialin Wan [view email] [v1] Mon, 31 Mar 2025 09:17:10 UTC (1,561 KB) [v2] Tue, 20 May 2025 09:41:52 UTC (1,722 KB) [v3] Fri, 27 Mar 2026 06:17:33 UTC (5,402 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
researchpaperarxiv
Roguelike Devlog: Redesigning a Game UI With an AI 2D Game Maker
<p>Sector Scavengers is a spacefaring extraction roguelike where each run feeds a larger civilization-building meta game. This week was all about solving a UI problem that kept getting worse the longer I ignored it: one hub trying to do too much.</p> <p>What I learned quickly is that running both game modes through a single central hub was making both of them worse. Here is how I used Makko to work through it.</p> <h2> When One Screen Tries to Do Everything </h2> <p>My meta progression systems — crew advancement, station building, hardware research, void powers, and card unlocks — were all living in the same HUD as the controls for individual Expedition runs. On paper it sounded efficient. In practice it created a serious information architecture problem.</p> <p>The deeper I got into it, t
New Research Directions in Materials Science with AI - Bioengineer.org
<a href="https://news.google.com/rss/articles/CBMigwFBVV95cUxNd0wwNmxWampidEpMUC1lUEhkZU9WanN4OHVSSENtalZ0dm5OWkx3Ull2RktEaXJiVkUzRVNxbzMyNlRTcER3eW9YWXZWclhNTE1CcTFkVWdqOTZjdFhDUGxwbjVKWFpwUi14ZllfU19PN25KNlBQSzRicFdCdzdqQ3h2cw?oc=5" target="_blank">New Research Directions in Materials Science with AI</a> <font color="#6f6f6f">Bioengineer.org</font>

Buffer Overflows on x64 Windows: A Practical Beginners Guide (Part 2): Exploitation
<h2> Introduction </h2> <p>Welcome back. Mirrai here. In part 1 we covered the theory. The stack, RIP, and what a buffer overflow actually is. Now we get our hands dirty. By the end of this guide you should have a working exploit that gives you control of RIP and redirects execution to your own code.<br> Before we start, make sure you have x64dbg and pwntools installed from part 1. You'll also need the vulnerable program we wrote. If you haven't read part 1, go do that first. Buckle up, this might take a while.</p> <p>For your convenience, here's the old vuln program code<br> </p> <div class="highlight js-code-highlight"> <pre class="highlight c"><code><span class="cp">#include</span> <span class="cpf"><stdio.h></span><span class="cp"> #include</span> <span class="cpf"><windows.h></span><s
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers
AI maps science papers to predict research trends two to three years ahead - Tech Xplore
<a href="https://news.google.com/rss/articles/CBMie0FVX3lxTE5aTkZYTWdaRDZwTXNRMldpMG1WZ1YzWDZTOHN5M183Z3A1ZTFYbnhEWTdPRmpvZnZFU0xodlRsNWxFaGxTcEpwalhJNmJpQWE5VjhaRS1tOXJIeTc5Z0JNblJ3dFd4WjRYZGJOX0NrWGt6ZmZJVTBpRm5wWQ?oc=5" target="_blank">AI maps science papers to predict research trends two to three years ahead</a> <font color="#6f6f6f">Tech Xplore</font>
AI inspires new research topics in materials science - Nanowerk
<a href="https://news.google.com/rss/articles/CBMiZ0FVX3lxTFBPWlJSM2ExeVQ3LVppTm45NHpEMW9YVkxscThCNDd2OVB0c3J1ZmVCbWNSZWZ0TjZwSzlOdEFXN2UtRk5LU1hxdXd4ZklldGxoM0FZSnhCd19PWkNHQ1ZRVDNwSHNUSk0?oc=5" target="_blank">AI inspires new research topics in materials science</a> <font color="#6f6f6f">Nanowerk</font>

AI maps science papers to predict research trends two to three years ahead
The number of scientific papers is growing so rapidly that scientists are no longer able to keep track of all of them, even in their own research area. Researchers from the Karlsruhe Institute of Technology (KIT), in collaboration with scientific partners, have shown how new research ideas can still be obtained from this wealth of information. Using artificial intelligence (AI), they systematically analyzed materials science publications to identify potential new avenues of research. Their results have been published in Nature Machine Intelligence.
Oracle Cuts 30,000 Jobs to Fund Its AI Gamble - CX Today
<a href="https://news.google.com/rss/articles/CBMikwFBVV95cUxQTTFVNGlKYVNVVThtbUowS01MSTIzemNzV2Y4NWMtd0ItNXhxeXVtUENILXdIVHVSSnZodkFqRkdxdkhqaFo3X3VQbmdSNkdBLWlyeS1xOU01blFLa01UZ0hQMlkza1dpMVRKQk5xVmM5dUFHcURMblN6b05HTjZlZjlXeWlLZ1ROdFh3eTl6WlA1Y00?oc=5" target="_blank">Oracle Cuts 30,000 Jobs to Fund Its AI Gamble</a> <font color="#6f6f6f">CX Today</font>
Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!