CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims priority to Chinese Patent Application Ser. No. CN2023104882058 filed on 4 May 2023.
TECHNICAL FIELD
The invention relates to a privacy-preserving task-oriented semantic communication method and system, belonging to the wireless communication technical field.
BACKGROUND OF THE INVENTION
In order to further improve the performance of communication systems, deep learning is applied in the field of communication, such as joint source-channel coding, channel estimation, and wireless resource management. However, emerging intelligent applications, such as AR/VR, autonomous driving, and environmental monitoring, pose serious challenges to deep learning-based communication systems designed to reliably transmit data. For instance, in the case of autonomous driving, the onboard sensor systems collect a vast amount of data during the driving process. If all the data were directly transmitted to the roadside units for inference, it might result in excessive communication delays, hindering efficient decision-making. To address this issue, a task-oriented semantic communication approach has been proposed. In this method, the transmitting end extracts and transmits only the task-relevant information during the communication process.
The existing semantic communication schemes heavily rely on deep learning techniques and directly transmit semantic features, which could easily lead to privacy leakage issues. For example, an attacker could use model inversion to reconstruct the illegally obtained transmitted features back into the original inputs, thereby violating user privacy. Despite the maturity of privacy protection methods, they are challenging to directly apply to semantic communication systems. On the one hand, deep learning-driven semantic communication systems are primarily based on autoencoder architectures, trained through end-to-end training. The introduction of existing privacy protection methods might impede the training of semantic communication systems. On the other hand, existing privacy protection methods such as differential privacy might significantly impact the performance of semantic communication systems because they directly inject noise into the transmitted features.
SUMMARY OF THE INVENTION
To address the shortcomings of existing technologies, this invention takes into account both privacy concerns and edge inference. It provides a privacy-preserving task-oriented semantic communication method and system. Specifically, the features transmitted by this invention enable low-latency edge inference while meeting distortion constraints at the adversary's end. This approach effectively mitigates model inversion attacks. To achieve this, the present invention utilizes an information bottleneck and distortion function to construct a Lagrangian function, effectively balancing both privacy and edge inference performance. The variational approximation, re-parameterization technique and Monte Carlo sampling are used to compute the mutual information terms in the objective function. In the process of training, the semantic communication system is trained based on adversarial learning mechanism, and the output features of the transmitter can deceive potential opponents by maximizing reconstruction distortion.
The Technical Scheme of the Invention
A privacy-preserving task-oriented semantic communication method is proposed, where the communication scenario involves a user, an edge server, and a potential adversary. The specific steps include:
- Constructing a privacy-preserving task-oriented semantic communication system model;
- Constructing an objective function based on the established semantic communication system model from step (1) and the privacy requirements;
- Reconstructing the objective function constructed in step (2) using variational approximations, Monte Carlo sampling, and reparameterization techniques;
- Designing an adversarial learning mechanism to train the semantic communication system model based on the transformed objective function from step (3);
- Performing task-oriented semantic communication using the trained semantic communication system model obtained from step (4), which includes: the transmitter extracting and transmitting task-relevant semantic information from the image input; transmitting the semantic information through a wireless channel; and the receiver completing task inference based on the received signal.
The semantic communication system model comprises a transmitter network and a receiver network. The transmitter network comprises a feature extractor and a joint source-channel (JSC) encoder, while the receiver network includes a task inference module and a data reconstruction module;
The feature extractor extracts task-relevant semantic information from the input, after which the JSC encoder maps the task-relevant semantic information to channel input symbols. The process is represented as (I):
- where s∈␣
is the input
∈
represents the channel input symbol. Tθ(·) stands for transmitter network (i.e. feature extractor and JSC encoder), θ is its parameters.
is transmitted through wireless channels, and the signal
received at the receiver is
=h
+n, where h stands for channel gain, and n is additive white Gaussian noise.
The task inference module uses the received signal
directly for task execution, which is represented as (II):
- where
∈□k is the channel output. ŷ∈□l represents the inference result. Rϕ(·) stands for task inference module, ϕ is its parameters.
- a. The data reconstruction module reconstructs the received signal
into the original input, and this process is expressed as (III):
- where ŝ∈□″ is the reconstructed output. Dγ(·) represents data reconstruction module, γ stands for its parameters.
- a. In step (2), the constructed objective function is (IV):
- where the first item LIB is information bottleneck loss; The second item LMSE is mean square error loss; λ is the trade-off parameter between privacy and edge inference performance, and its range is [0,1].
In step (3), the objective function constructed in step (2) is reconstructed and expressed as (V):
- where LVIB is information bottleneck loss; LMSE is mean square error loss; λ is the trade-off parameter between privacy and edge inference performance; si is i-th sample of image dataset; ŝi is reconstruction of si. M stands for a total of M pairs (si, yi); N is the number of samples taken from the noise channel for each pair (si, yi); β is a constant; KL(·∥·) is the divergence and is used to calculate the difference between two distributions.
- a. In step (4), based on the objective function reconstructed in step (3), adversarial learning mechanism is designed to train the semantic communication system model. The specific training steps are as follows:
Randomly initialize the parameters of the semantic communication system model;
- The training data is input into the semantic communication system model. The training data is image data, which is divided into S1 and S2;
- Simulate potential adversary, namely training data reconstruction module;
- Simulate the user, train the transmitter network;
- Steps 3) and 4) are performed alternately until the termination condition is met, then output the parameters θ and ϕ of the semantic communication system model.
- In step 3), the specific implementation process includes:
- The transmitter network extracts and transmits task-related semantic information. The specific is as follows: Tθ(s1)→
. s1 is the training data, from the S1;
is the extracted feature of the transmitter network;
is transmitted over wireless channels;
The data reconstruction module reconstructs the original input based on the received
. The specific is as follows: Dγ(
)→ŝ1.
is the representation of
after passing through the wireless channel, and ŝ1 is the recovery of s1;
- Calculate the mean square error loss based on (VI):
- where LMSE is mean square error loss; M indicates the number of sample; s1,i is the i-th sample in the input image dataset s1; ŝ1,i is the recovery of $1,i;
The transmitter network parameters are frozen, and the Adam optimizer is used to update the network parameter γ of the data reconstruction module.
In step 4), the specific implementation process is as follows:
The transmitter network extracts and transmits task-related semantic information. The specific is as follows: Tθ(s2)→
2. s2 is the training data, from the S2;
2 is the extracted feature of the transmitter network;
2 is transmitted over wireless channels;- The task inference module performs task inference based on the received
2. The specific is as follows: Rϕ(
2)→ŷ2. The data reconstruction module reconstructs the original input based on the received {circumflex over (z)}2. The specific is as follows: Dγ(
2) ŝ2.
2 is the representation of
2 after passing through the wireless channel, and ŝ2 is the recovery of s2; ŷ2 is the output of the task inference module; - Calculate the loss based on (V);
The data remodeling network parameters are frozen, and the transmitter network parameters and the task inference module network parameters are updated through the Adam optimizer.
A computer device comprising memory and a processor, wherein the memory stores a computer program, and the processor, when executing the computer program, implements the steps of a task-oriented semantic communication method that ensures privacy protection.
A computer-readable storage medium storing a computer program, wherein the said computer program, when executed by a processor, implements the steps of a task-oriented semantic communication method that ensures privacy protection.
A privacy-preserving task-oriented semantic communication system:
The semantic communication system model building module is configured to: build a privacy-preserving task-oriented semantic communication system model;
- The objective function construction module is configured to: construct the objective function according to the established semantic communication system model and privacy requirements;
- The objective function reconstruction module is configured to: reconstruct the constructed objective function;
- The semantic communication system model training module is configured as follows: based on the reconstructed objective function, the adversarial learning mechanism is designed to train the semantic communication system model;
- The task execution module is configured to: conduct task-oriented semantic communication through the trained semantic communication system model.
The Invention has the Following Beneficial Effects
Aiming at the privacy problems in the semantic communication system and the difficulty of the existing privacy methods to directly apply to the semantic communication system, the invention proposes a privacy-preserving task-oriented semantic communication method and system. Firstly, the Lagrange function is constructed by using the information bottleneck and distortion measure as the final objective function. The semantic communication system is then trained based on adversarial learning mechanisms so that the transmitted features of the transmitter can deceive potential adversaries while ensuring low-delay edge inference. Compared to existing designs, the proposed solution in this invention achieves a good balance between privacy and utility.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a schematic diagram illustrating the operational scenario of the privacy-preserving task-oriented semantic communication method in this invention;
FIG. 2 is a structural diagram of the semantic communication system model in the invention;
FIG. 3 shows the relationship between the privacy measurement metrics SSIM (Structural Similarity Index) and SNR (Signal-to-Noise Ratio) of the semantic communication method proposed in this invention and the existing Deep JSCC method;
FIG. 4 shows the relationship between classification accuracy and SNR of the semantic communication method provided by the invention and the existing Deep JSCC method.
DETAILED DESCRIPTION OF THE INVENTION
The present invention is further defined in combination with the drawings and embodiments in the specification, but is not limited to this.
Implementation Example 1
As shown in FIG. 1, a privacy-preserving task-oriented semantic communication method is proposed, and the method operates in a scenario that includes a user, an edge server, and a potential adversary. The user extracts the task-related semantic information from the input and transmits it to the edge server. The edge server performs task inference based on the received task-related information. The opponent illegally obtains the transmitted signal and reconstructs the original input through model inversion attack, thus violating the user's privacy. The invention aims to realize privacy-utility tradeoff, and proposes a privacy-preserving task-oriented semantic communication method. Specific steps include:
- (1) Constructing a privacy-preserving task-oriented semantic communication system model;
- (2) Constructing an objective function based on the established semantic communication system model from step (1) and the privacy requirements;
- (3) Reconstructing the objective function constructed in step (2) using variational approximations, Monte Carlo sampling, and reparameterization techniques;
- (4) Designing an adversarial learning mechanism to train the semantic communication system model based on the transformed objective function from step (3);
- (5) Performing task-oriented semantic communication using the trained semantic communication system model obtained from step (4), which includes: the transmitter extracting and transmitting task-relevant semantic information from the image input (Taking the image classification task on the MNIST dataset as an example, the image input is the image pixel; Semantic information refers to feature vectors related to MNIST categories); transmitting the semantic information through a wireless channel; and the receiver completing task inference based on the received signal.
Implementation Example 2
According to Embodiment 1, a privacy-preserving task-oriented semantic communication method is described. The differences are as follows:
As shown in FIG. 2, the semantic communication system model comprises a transmitter network and a receiver network. The transmitter network consists of a feature extractor and a joint source-channel (JSC) encoder. The receiver network comprises a task inference module and a data reconstruction module. The feature extractor is a convolutional neural network consisting of three convolutional layers. The JSC encoder is a convolutional neural network comprising one convolutional layer and one fully connected layer. The task inference module is a convolutional neural network comprising two convolutional layers and two fully connected layers. The data reconstruction module is a convolutional neural network consisting of four convolutional layers and one fully connected layer.
The feature extractor extracts task-relevant semantic information from the input, after which the JSC encoder maps the task-relevant semantic information to channel input symbols. The process is represented as (I):
- s∈␣″ is the input
∈␣k represents the channel input symbol. Tθ(·) stands for transmitter network (i.e. feature extractor and JSC encoder), θ is its parameters.
is transmitted through wireless channels, and the signal
received at the receiver is
=h
+n, where h stands for channel gain, and n is additive white Gaussian noise.
The task inference module uses the received signal
directly for task execution, which is represented as (II):
- where
∈␣k is the channel output. ŷ∈␣l represents the inference result. Rϕ(·) stands for task inference module, ϕ is its parameters.
- a. The data reconstruction module reconstructs the received signal
into the original input, and this process is expressed as (III):
- where ŝ∈␣″ is the reconstructed output. Dγ(·) represents data reconstruction module, γ stands for its parameters.
In step (2), the constructed objective function is (IV):
- where the first item LIB is information bottleneck loss; The second item LMSE is mean square error loss; λ is the trade-off parameter between privacy and edge inference performance, and its range is [0,1].
In step (3), the objective function constructed in step (2) is reconstructed to make it easy to calculate, as follows:
The information bottleneck loss is expressed as:
- where Y is the target variable. H(Y) is entropy. According to the semantic communication system model established in step (1), p(
|s) is represented as p(
|s)=pθ(
|
) pchannel(
|
) in (V), where pθ(
|s) is the coding distribution and pchannel(
/
) is the channel distribution. p(
) and p(y|
) follow Markov chain Y↔S↔{circumflex over (Z)} and are denoted by:
In (V), H(Y) depends on the input data and can be ignored during optimization. For p(
) and p(y|
) which are difficult to compute in high dimensional space, variational distributions q(
) and qϕ(y|
) are used to replace them. Thus, (V) can be expressed as (VIII):
By using reparameterization techniques and Monte Carlo sampling, an unbiased estimate of LVIB can be further obtained, which is expressed as (IX):
- where M stands for a total of M pairs (si, yi); N is the number of samples taken from the noise channel for each pair (si, yi).
The mean square error loss LMSE is expressed as (X):
Substituting (IX) and (X) into (IV), the final objective function is obtained as follows:
- where LVIB is information bottleneck loss; LMSE is mean square error loss; λ is the trade-off parameter between privacy and edge inference performance; si is i-th sample of image dataset; ŝi is reconstruction of si. M stands for a total of M pairs (si, yi); N is the number of samples taken from the noise channel for each pair (si, yi); β is a constant; KL(·∥·) is the divergence and is used to calculate the difference between two distributions.
In step (4), based on the objective function reconstructed in step (3), adversarial learning mechanism is designed to train the semantic communication system model. The specific training steps are as follows:
- Randomly initialize the parameters of the semantic communication system model;
- The training data is input into the semantic communication system model. The training data is image data, which is divided into S1 and S2;
- Simulate potential adversary, namely training data reconstruction module;
- Simulate the user, train the transmitter network;
- Steps 3) and 4) are performed alternately until the termination condition (e.g. maximum number of iterations) is met, then output the parameters θ and ϕ of the semantic communication system model.
In step 3), the specific implementation process includes:
- The transmitter network extracts and transmits task-related semantic information. The specific is as follows: Tθ(s1)→
. s1 is the training data, from the S1;
is the extracted feature of the transmitter network;
is transmitted over wireless channels;
The data reconstruction module reconstructs the original input based on the received
. The specific is as follows: Dγ(
1)→ŝ1.
1 is the representation of
1 after passing through the wireless channel, and ŝ1 is the recovery of s1;
Calculate the mean square error loss based on (XII):
- where LMSE is mean square error loss; M indicates the number of sample; s1,i is the i-th sample in the input image dataset s1; ŝ1,i is the recovery of s1,i;
- The transmitter network parameters are frozen, and the Adam optimizer is used to update the network parameter γ of the data reconstruction module.
In step 4), the specific implementation process is as follows:
The transmitter network extracts and transmits task-related semantic information. The specific is as follows: Tθ(s2)→
2. s2 is the training data, from the S2;
2 is the extracted feature of the transmitter network;
2 is transmitted over wireless channels;- The task inference module performs task inference based on the received
2. The specific is as follows: Rϕ(
2)→ŷ2. The data reconstruction module reconstructs the original input based on the received
2. The specific is as follows: Dγ(
2)→ŝ2.
2 is the representation of
2 after passing through the wireless channel, and ŝ2 is the recovery of s2; ŷ2 is the output of the task inference module; - Calculate the loss based on (XI);
- The data remodeling network parameters are frozen, and the transmitter network parameters and the task inference module network parameters are updated through the Adam optimizer.
In step 4), the specific implementation process is as follows:
The transmitter network extracts and transmits task-related semantic information. The specific is as follows: Tθ(s2)→
2. s2 is the training data, from the S2;
2 is the extracted feature of the transmitter network;
2 is transmitted over wireless channels;- The task inference module performs task inference based on the received
2. The specific is as follows: Rϕ(
2)→ŷ2. The data reconstruction module reconstructs the original input based on the received
2. The specific is as follows: Dγ(
2)→ŝ2.
2 is the representation of
2 after passing through the wireless channel, and ŝ2 is the recovery of s2; ŷ2 is the output of the task inference module; - Calculate the loss based on (V);
- The data remodeling network parameters are frozen, and the transmitter network parameters and the task inference module network parameters are updated through the Adam optimizer.
To validate the effectiveness of the present invention, testing was conducted on the MNIST dataset. The adopted comparative methods are the existing semantic communication methods and the combination of this method with differential privacy.
From FIG. 3, it is evident that the method proposed in this invention, through iterative optimization, makes the extracted and transmitted features difficult to be effectively reconstructed into the original image by adversaries (i.e., indicated by the low SSIM index values evaluating image quality). This indicates the method's capability to effectively protect user privacy.
From FIG. 4, it is evident that the method proposed in this invention maintains high performance in edge inference tasks (i.e., high classification accuracy) while effectively protecting user privacy. In contrast, traditional semantic communication methods incorporating commonly differential privacy experience significant performance drops in task performance (i.e., decreased classification accuracy) when privacy requirements are increased.
Implementation Example 3
A computer device comprising memory and a processor, wherein the memory stores a computer program, and the processor, when executing the computer program, implements the steps of the privacy-preserving task-oriented semantic communication method as described in embodiments 1 or 2.
Implementation Example 4
A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the steps of the privacy-preserving task-oriented semantic communication method as described in embodiments 1 or 2.
Implementation Example 5
A privacy-preserving task-oriented semantic communication system:
The semantic communication system model building module is configured to: build a privacy-preserving task-oriented semantic communication system model;
The objective function construction module is configured to: construct the objective function according to the established semantic communication system model and privacy requirements;
The objective function reconstruction module is configured to: reconstruct the constructed objective function;
The semantic communication system model training module is configured as follows: based on the reconstructed objective function, the adversarial learning mechanism is designed to train the semantic communication system model;
The task execution module is configured to: conduct task-oriented semantic communication through the trained semantic communication system model.