{"title":"Secure Transmission via Constellation Splitting","authors":"Hongliang He;Xingmei Li;Ce Zheng","doi":"10.1109/LCOMM.2025.3564508","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3564508","url":null,"abstract":"To enhance the security of wireless communications, we propose a constellation splitting-based friendly jamming scheme in this letter. The scheme splits the real and imaginary (or the in-phase and quadrature) components of a complex signal, using the real part to convey private information while embedding artificial noise into the imaginary part. Upon receiving the signal, the legitimate receiver can separate the real and imaginary components to extract the private information, while the eavesdropper’s signal remains obscured by the artificial noise. We analyze the bit error rate (BER) of the proposed scheme, with results showing that the eavesdropper’s BER remains at a high level.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1416-1420"},"PeriodicalIF":3.7,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diancheng Cheng;Fan Wu;Cong Zhang;Dusit Niyato;Yuan’an Liu
{"title":"Enhancing Multi-Source Ambient Backscatter Communication With Transmit Power Coordination","authors":"Diancheng Cheng;Fan Wu;Cong Zhang;Dusit Niyato;Yuan’an Liu","doi":"10.1109/LCOMM.2025.3564338","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3564338","url":null,"abstract":"In practical massive Internet of Things (IoT), the backscatter device (BD) in ambient backscatter communication (AmBC) systems can be illuminated by multiple ambient sources. However, multiple sources cause severe multi-source direct-link interference (M-DLI) to the BDs while providing multi-source backscattering. The signal-to-noise-plus-interference ratio (SINR) is sensitive to the transmit power of the sources. To fully benefit from multiple sources, this letter introduces transmit power coordination (TPC) strategies to suppress M-DLI and enhance backscattering by tuning the transmit power of the sources within their available ranges, which is particularly suitable for densely deployed passive BDs. To conduct the TPC strategies, the primary objective is to minimize the bit-error-rate (BER) in the multi-source AmBC system by solving a Rayleigh quotient (RQ) maximization problem. Simulation results show that the proposed TPC-assisted receive beamforming method achieves more efficient symbol detection than traditional AmBC detectors and outperforms conventional multi-antenna techniques, especially under low direct-link signal-to-noise ratio (SNR) conditions.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1411-1415"},"PeriodicalIF":3.7,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MVSC: Mamba Vision Based Semantic Communication for Image Transmission With SNR Estimation","authors":"Chongyang Li;Tianqian Zhang;Shouyin Liu","doi":"10.1109/LCOMM.2025.3563920","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3563920","url":null,"abstract":"This letter proposes a novel semantic communication approach named Mamba Vision-based Semantic Communication (MVSC) for image transmission with integrated Signal-to-Noise Ratio (SNR) estimation. Unlike prior works that assume the SNR of the received signal is known and input a predetermined SNR value into a deep learning (DL) network, MVSC introduces an implicit SNR estimation module, allowing the network to infer channel conditions for SNR adaptation. To further improve performance, we propose the MVSC4, a joint-optimized of MVSC, which is trained using a multi-task learning strategy that simultaneously optimizes image reconstruction, SNR estimation, signal denoising, and image classification. This joint optimization enhances the network’s robustness to varying SNR conditions, particularly in low-SNR environments. Comparative experiments on CIFAR-10 and Kodak datasets demonstrate that MVSC4 outperforms both CNN-based and Transformer-based methods in terms of Peak Signal-to-Noise Ratio (PSNR) and Multiscale Structural Similarity (MS-SSIM). The results demonstrate the effectiveness and robustness of the proposed approach.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1406-1410"},"PeriodicalIF":3.7,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Security-Latency Design for Short Packet-Based Low-Altitude Communications","authors":"Zeyin Wang;Di Zhang;Shaobo Jia;Lulu Song;Yanqun Tang","doi":"10.1109/LCOMM.2025.3563514","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3563514","url":null,"abstract":"In this letter, a joint security and latency analysis of short packet-based low-altitude communications when the eavesdropper is close to the receiver is addressed. To reveal the impacts of the signal-to-noise ratio (SNR) and block-length on latency in communications, we propose a new metric named secure latency (SL) and derive the expressions for the effective secure probability (ESP) and the average SL. To minimize the average SL, different transmission designs are analyzed, in which the optimal solutions of SNR and block-length are provided. Numerical results validate our analysis and reveal the trade-off between reliability and security and the impacts of the block-length, SNR, and packet-generating rate on average SL, of which SNR and the block-length account for main factors. In addition, we find that the performance of SL can be enhanced by allocating less SNR.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1401-1405"},"PeriodicalIF":3.7,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corrections and Comments on “Modified OSD Algorithm With Reduced Gaussian Elimination”","authors":"Marc Fossorier;Mahdi Shakiba-Herfeh;Huazi Zhang","doi":"10.1109/LCOMM.2025.3563185","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3563185","url":null,"abstract":"In [1], the redaction of the results of Section-˜IV has been mixed up. For a reduced echelon form (REF) representation of the code, the sets <italic>B<sub>K,MR</sub></i> and <italic>P<sub>N–K,MR</sub></i> represent the information positions and the parity check positions that belong to the K most reliable positions of the received sequence, respectively. Section-˜IV should read.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1400-1400"},"PeriodicalIF":3.7,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zifeng Tang;Cuicui Zhang;Xinyan Zhou;Shengliang Zhu;Anxue Zhang;Zhensheng Shi
{"title":"A Phase Offset Blind Estimation Algorithm for QAM Modulation and Its FPGA Implementation","authors":"Zifeng Tang;Cuicui Zhang;Xinyan Zhou;Shengliang Zhu;Anxue Zhang;Zhensheng Shi","doi":"10.1109/LCOMM.2025.3562854","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3562854","url":null,"abstract":"This letter presents the design, implementation, and validation of an FPGA-based phase offset estimation and compensation algorithm for RF communication systems. The algorithm improves the vector-valued phase estimator (VVPE) method by selecting the outermost constellation points to improve the phase estimation accuracy, and it supports various QAM modulation schemes. The effectiveness of the algorithm is first verified through MATLAB simulations and Pluto SDR-based experiments, during which the optimal value of the averaging filter parameter N is determined. The algorithm is then implemented on an FPGA, and a test system is developed in conjunction with RF instruments to validate its performance. The experimental results demonstrate that the proposed system achieves high accuracy, low latency, and efficient utilization of hardware resources, making it suitable for practical communication applications.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1395-1399"},"PeriodicalIF":3.7,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Beamforming for RIS-Aided ISAC System With CRB Minimization","authors":"Shuo Yang;Chenhao Qi;Wei Ci;Wu Luo","doi":"10.1109/LCOMM.2025.3562748","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3562748","url":null,"abstract":"Since the security is an important issue in integrated sensing and communications (ISAC), especially when the targets also act as potential eavesdroppers, we investigate the secure beamforming design for the reconfigurable intelligent surface (RIS)-aided ISAC system. Aiming at minimizing the worst-case Cramér-Rao bound of the two-dimensional direction-of-arrival estimation of the eavesdropper, we consider the joint design of transmit beamforming and RIS phase shifts subject to the constraints of signal-to-interference-plus-noise ratio (SINR) of each user and the worst-case eavesdropping SINR. To solve this joint optimization problem, we propose an algorithm based on penalty dual decomposition. Numerical results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1390-1394"},"PeriodicalIF":3.7,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shao-Di Wang;Chang-Long Wang;Hui-Ming Wang;Feng Zhou;Victor C. M. Leung
{"title":"Uplink Control Information-Based Clustered Access and Discontinuous Reception Management for mMTC","authors":"Shao-Di Wang;Chang-Long Wang;Hui-Ming Wang;Feng Zhou;Victor C. M. Leung","doi":"10.1109/LCOMM.2025.3562602","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3562602","url":null,"abstract":"Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively exploring the synergy between UCI and DRX concerning both energy conservation and latency reduction for mMTC. In this letter, we propose a UCI-based clustered access and DRX management (UCADM) scheme that strikes a balance between these two critical performance metrics, reducing energy usage while preserving low latency in uplink-downlink interaction for mMTC. Specifically, we present a strictly feasible solution for the proposed UCADM scheme by using the spectral radius and the constraint projection, which can effectively solve DRX switching operations as indicated by scheduling information from UCI. Simulation results confirm the effectiveness of our scheme.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1380-1384"},"PeriodicalIF":3.7,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongxu Chang;Qingqing Peng;Guanghui Wang;Guiying Yan
{"title":"A Cross-Layer Scheduling Method for Pipelined Layered Multi-Edge Type QC-LDPC Decoder With Better Conflict Resolution","authors":"Dongxu Chang;Qingqing Peng;Guanghui Wang;Guiying Yan","doi":"10.1109/LCOMM.2025.3562626","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3562626","url":null,"abstract":"For multi-edge type quasi-cyclic low-density parity-check (MET-QC-LDPC) codes, the presence of common variable nodes shared between rows within a single layer poses great challenges for the hardware design of the decoder. In this study, a cross-layer update scheduling method for pipelined layered MET-QC-LDPC codes is proposed to achieve improved conflict resolution. Through a probabilistic analysis, we show that by pairing layers with relatively small common degrees and performing alternating updates between the paired layers, better conflict resolution can be achieved than the layer-by-layer updating approach. Experimental results demonstrate that, at medium to low code rates, 50% to 75% of memory conflicts can be mitigated through the proposed cross-layer scheduling compared to the layer-by-layer scheduling approach, without compromising decoding performance.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1385-1389"},"PeriodicalIF":3.7,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node Attention-Embedded Broad Learning Method for Few-Shot Specific Emitter Identification","authors":"Hui Liu;Dengxi Wang;Yupeng Chen","doi":"10.1109/LCOMM.2025.3561934","DOIUrl":"https://doi.org/10.1109/LCOMM.2025.3561934","url":null,"abstract":"In non-cooperative communication reconnaissance scenarios, the limited number of intercepted signals introduces the few-shot specific emitter identification (SEI) problem. Deep learning-based SEI methods are prone to overfitting, resulting in poor recognition performance under few-shot conditions. To address this issue, this letter proposes a broad learning-based SEI method embedded with an node attention mechanism. The broad learning system (BLS) is employed to simplify the network structure, mitigating overfitting caused by limited samples, while the node attention mechanism is introduced to enhance the model’s ability to capture important features. Experiments conducted on a publicly available ADS-B dataset demonstrate that BLS effectively addresses the overfitting problem of deep learning under few-shot conditions. Furthermore, due to the incorporation of the node attention mechanism, the proposed method achieves improved recognition accuracy compared to the baseline BLS model.","PeriodicalId":13197,"journal":{"name":"IEEE Communications Letters","volume":"29 6","pages":"1365-1369"},"PeriodicalIF":3.7,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}