Live
Black Hat USAAI BusinessBlack Hat AsiaAI Business‘System failure’ paralyzes Baidu robotaxis in ChinaTechCrunch AICrack ML Interviews with Confidence: Anomaly Detection (20 Q&A)Towards AIHow We Built an EdTech Platform That Scaled to 250K Daily UsersDEV CommunityRoguelike Devlog: Redesigning a Game UI With an AI 2D Game MakerDEV CommunityI spent days debugging a cron job that was "working fine"DEV CommunityLLM Agents Need a Nervous System, Not Just a BrainDEV CommunityThe 22,000 Token Tax: Why I Killed My MCP ServerDEV CommunityOpenSpec (Spec-Driven Development) Failed My Experiment — Instructions.md Was Simpler and FasterDEV CommunityClaude Code bypasses safety rule if given too many commandsThe Register AI/MLI Asked AI to Do Agile Sprint Planning (GitHub Copilot Test)DEV Community🌪️ Proof of Work: The To-Do List of Infinite RegretDEV CommunityShaping the UAE’s Digital Destiny: Building Sovereignty, Trust, and Resilience in the Cyber EraEE TimesBlack Hat USAAI BusinessBlack Hat AsiaAI Business‘System failure’ paralyzes Baidu robotaxis in ChinaTechCrunch AICrack ML Interviews with Confidence: Anomaly Detection (20 Q&A)Towards AIHow We Built an EdTech Platform That Scaled to 250K Daily UsersDEV CommunityRoguelike Devlog: Redesigning a Game UI With an AI 2D Game MakerDEV CommunityI spent days debugging a cron job that was "working fine"DEV CommunityLLM Agents Need a Nervous System, Not Just a BrainDEV CommunityThe 22,000 Token Tax: Why I Killed My MCP ServerDEV CommunityOpenSpec (Spec-Driven Development) Failed My Experiment — Instructions.md Was Simpler and FasterDEV CommunityClaude Code bypasses safety rule if given too many commandsThe Register AI/MLI Asked AI to Do Agile Sprint Planning (GitHub Copilot Test)DEV Community🌪️ Proof of Work: The To-Do List of Infinite RegretDEV CommunityShaping the UAE’s Digital Destiny: Building Sovereignty, Trust, and Resilience in the Cyber EraEE Times

A Channel-Triggered Backdoor Attack on Wireless Semantic Image Reconstruction

arXivMarch 30, 202610 min read0 views
Source Quiz

arXiv:2503.23866v3 Announce Type: replace-cross Abstract: This paper investigates backdoor attacks in image-oriented semantic communications. The threat of backdoor attacks on symbol reconstruction in semantic communication (SemCom) systems has received limited attention. Previous research on backdoor attacks targeting SemCom symbol reconstruction primarily focuses on input-level triggers, which are impractical in scenarios with strict input constraints. In this paper, we propose a novel channel-triggered backdoor attack (CT-BA) framework that exploits inherent wireless channel characteristics — Jialin Wan (Sherman), Jinglong Shen (Sherman), Nan Cheng (Sherman), Zhisheng Yin (Sherman), Yiliang Liu (Sherman), Wenchao Xu (Sherman), Xuemin (Sherman), Shen

View PDF HTML (experimental)

Abstract:This paper investigates backdoor attacks in image-oriented semantic communications. The threat of backdoor attacks on symbol reconstruction in semantic communication (SemCom) systems has received limited attention. Previous research on backdoor attacks targeting SemCom symbol reconstruction primarily focuses on input-level triggers, which are impractical in scenarios with strict input constraints. In this paper, we propose a novel channel-triggered backdoor attack (CT-BA) framework that exploits inherent wireless channel characteristics as activation triggers. Our key innovation involves utilizing fundamental channel statistics parameters, specifically channel gain with different fading distributions or channel noise with different power, as potential triggers. This approach enhances stealth by eliminating explicit input manipulation, provides flexibility through trigger selection from diverse channel conditions, and enables automatic activation via natural channel variations without adversary intervention. We extensively evaluate CT-BA across four joint source-channel coding (JSCC) communication system architectures and three benchmark datasets. Simulation results demonstrate that our attack achieves near-perfect attack success rate (ASR) while maintaining effective stealth. Finally, we discuss potential defense mechanisms against such attacks.

Subjects:

Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Cite as: arXiv:2503.23866 [cs.CR]

(or arXiv:2503.23866v3 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2503.23866

arXiv-issued DOI via DataCite

Submission history

From: Jialin Wan [view email] [v1] Mon, 31 Mar 2025 09:17:10 UTC (1,561 KB) [v2] Tue, 20 May 2025 09:41:52 UTC (1,722 KB) [v3] Fri, 27 Mar 2026 06:17:33 UTC (5,402 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
A Channel-T…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 206 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers