Adaptive Modulation and Retransmission Scheme For Semantic Communication Systems
Adaptive Modulation and Retransmission Scheme For Semantic Communication Systems
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
Abstract—Traditional adaptive modulation scheme aims to Thus, semantic communication has recently emerged as
maximize the spectral efficiency by selecting the appropriate a new end-to-end communication paradigm that focuses on
modulation scheme under the premise of perfect bit-level data conveying the meaning behind a message rather than the
transmission. However, in task-oriented semantic communication
systems, imperfect transmission can still lead to a good inference accurate message bits. In the Weaver’s communication model
performance of semantic tasks due to the error correction capa- mentioned above, it works on a semantic and effective level.
bility of neural networks. In this paper, we propose novel adaptive To be more specific, in semantic communication systems, the
modulation and retransmission schemes to maximize the spectral meaning of a message is first extracted at the transmitter
efficiency while guaranteeing the performance of semantic tasks. (TX) and then sent to a receiver (RX). Due to the shared
Specifically, we first introduce the robustness verification problem
in semantic communication systems to analyze the robustness knowledge base (KB), the RX can interpret the meaning
of neural network inference. We then formulate and solve the of received messages. Since it is very difficult to extract
modulation scheme selection problem constrained by a robustness the intrinsic semantics of the source, neural networks (NNs)
probability threshold. Consequently, a novel adaptive modula- are typically utilized to automatically extract features and
tion scheme is developed to maximize the spectral efficiency complete intelligent tasks [4].
while guaranteeing the goal of semantic communication. We
also develop a retransmission scheme using existing combining
techniques to further increase the data rate under harsh channel
A. Literature Review
conditions. Extensive simulations are performed in unencoded
and encoded semantic communication systems to validate the In general, existing works on semantic communication fall
effectiveness of the proposed schemes. into two categories: data-oriented reconstruction and task-
Index Terms—Machine learning, semantic communication, oriented inference. For data-oriented reconstruction, semantic
adaptive modulation, retransmission, robustness. information is extracted from semantic sources, such as text
[5], [6], images [7]–[9], speech [10] or videos [11], before
I. I NTRODUCTION being utilized to rebuild the original data. In contrast, for task-
oriented inference, only the task-related semantic information
The aim of conventional communication systems is to
is extracted and directly applied to accomplish the task [12],
ensure flawless and high-speed data transmission, regardless
[13]. Most of these works consider a novel joint source channel
of the meaning of messages. As a result, the traditional trans-
coding (JSCC) scheme. Different from traditional separate
mission techniques are primarily developed to combat vari-
source-channel coding methods, it utilizes NN for source and
ous channel impairments. However, Weaver’s groundbreaking
channel encoding and requires joint-training under certain
work [1] asserts that communication can actually be divided
channel statistics. Existing research shows that it can improve
into three levels: technical, semantic, and effective levels, from
the transmission reliability of semantic information, especially
low to high. Traditional communication is limited to the most
at low signal-to-noise ratio (SNR) [14].
basic technical level, only considering precise bit transmission.
Though the above-mentioned semantic communication sys-
While at the intermediate semantic level and high effective
tems have shown excellent performance under specific channel
level, precise meaning and effective transmission are taken
conditions, more and more in-depth studies are still needed to
into account, respectively.
further improve the spectral efficiency of wireless transmission
On the other hand, as the data rate approaches the Shannon
over time-varying channels. Traditional adaptive modulation
limit, traditional communication generally encounters obsta-
techniques maximize spectral efficiency by selecting the max-
cles to further increase the transmission rate. However, high
imum modulation scheme that does not exceed a certain bit
throughput becomes essential to enable emerging intelligent
error rate (BER). It can increase the average throughput and
applications, such as virtual reality (VR) and autonomous
reduce the energy consumption by adapting to fading channels
vehicles, in beyond fifth-generation (B5G) communications
compared with those systems designed for the worst channel
[2]. Additionally, with the advent of the Internet of Everything
conditions [15], [16].
(IoE), the massive amount of data exchange may cause severe
network congestion [3]. However, traditional transmission schemes ignore the mean-
ing behind transmitted bits. To resolve this issue, several
H. Gao, G. Yu, and Y. Cai are with the College of Information Science works have been proposed to investigate how to adapt the
and Electronic Engineering, Zhejiang University, Hangzhou 310027, China transmission rate according to the changing channels in se-
(e-mail: {huiguogao, yuguanding, ylcai}@zju.edu.cn). The work of Y. Cai
was supported in part by the National Natural Science Foundation of China mantic communication systems. Recently, the variable-length
under Grants 61971376, U22A2004, and 61831004. variational feature encoding (VL-VFE) has been utilized as a
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
way to adjust the length of transmitted features under different even overwriting of the previously learned model. Thus, the
channel conditions [17]. Specifically, by utilizing information performance in the previous channel environment decreases
bottleneck (IB) framework, more transmitted features can be significantly [25], [26], which is known as the catastrophic
activated by dynamic NNs to combat the noise when the forgetting (CF) phenomenon. Moreover, the performance of
channel condition deteriorates. In [18], the traditional rate- transfer learning depends heavily on the choice of pre-trained
distortion theory is extended and the IB theory is also lever- models, which creates obstacles in the training and further
aged to achieve an improved performance at the same signal application.
compression degree. A similar adaptive design can be found Additionally, when faced with countless intelligent tasks,
in [19], where the policy network is trained to improve recon- traditional encoding methods can make use of larger storage
struction quality as well as decrease transmitted features using capacities provided by hard disks, memory, or graph memory.
the Gumbel-Softmax scheme. While in [20], the projected However, the JSCC scheme is constrained by resource-limited
gradient descent optimization method is utilized to shape baseband chips. To be specific, in both traditional and JSCC
the signal constellation to adapt the rate. To mimic human schemes, different NNs are required to perform different
communications, a semantic communication with memory intelligent tasks, but their operational layers differ based on the
is introduced in [21]. Two dynamic transmission methods, open systems interconnection (OSI) model. In JSCC schemes,
importance mask and consecutive mask, are proposed based NNs directly encode semantic sources into modulated signals
on the relationship between the signal length and channel and decode them at the physical layer, utilizing resource-
noise. The dynamic transmission module is optimized by limited field-programmable gate arrays (FPGAs), application-
training the lower bound of mutual information to learn to specific integrated circuits (ASICs), or other baseband chips.
identify and mask unimportant semantic elements. However, On the other hand, in traditional systems, NNs extract semantic
SNR acquisition is indirect and can be erroneous in practice. data sources into features at the application layer, which are
Therefore, the pilot and received signals instead of accurate then subjected to channel encoding and modulation at the
SNR are jointly input to the decoder to help estimate the cur- physical layer. Since the NNs work at the application layer,
rent SNR and decode the signal in [22]. To further improve the they would consume far larger storage space of hard disk,
denoising capability, an adaptive bit-rate control mechanism memory or graphic memory than baseband chips.
based on self-attention denoising has been proposed in [23]. Thus, in this paper, we exploit the robustness verification
Specifically, the policy network is introduced to determine problem (RVP) to establish the connection between wireless
the appropriate coding rate and progressive hybrid automatic communication and performance of semantic tasks. The RVP
repeat request (HARQ) is introduced to enhance transmission aims to find the maximum input perturbation that keeps the
reliability. The HARQ technique is also utilized in [24]. output of NNs unchanged. Then, the robustness of NN can be
However, it focuses on combining the semantic coding (SC) described as how constant its output is, when the input data
with conventional Reed-Solomon (RS) channel coding and is perturbed. An NN is referred to as robust if it remains its
HARQ. The SC-RS-HARQ architecture is introduced and the output unchanged given specific input perturbations.
similarity detection network called Sim32 is also explored for In our scheme, the input perturbation of the inference net-
error detection. work is caused by channel imperfections. Since the robustness
verification focuses on the inference stage of NNs, we can
establish this connection independently of the training stage
B. Motivation of NNs. There are basically two approaches to solve the RVP.
However, the above-mentioned solutions for adaptive rate The first one uses branch and bound [27], mixed integer linear
control fail to be applied to current communication systems. programming [28], or satisfiability modulo theory [29] to
Essentially, it is inherently incompatible with the current obtain an exact and optimal solution. However, these methods
3rd Generation Partnership Project (3GPP) standard. First, consume a lot of time for computation and therefore cannot
traditional source encoding methods generalize to one or more be used even for small NNs. The second approach chooses
types of data. However, the NN-based source encoding method to relax the nonlinear activation in NNs to efficiently obtain
depends on both datasets and specific learning tasks. More- suboptimal solutions, such as duality method [30], abstract
over, traditional channel encoding methods can be applied domains [31], and local Lipschitz constants analysis [32].
to any channel environment. In contrast, the current JSCC However, due to the complex structure of models in semantic
schemes in semantic communication have poor generalization communication systems, these aforementioned methods can-
capabilities. It is true that JSCC schemes are capable of not solve the corresponding robustness verification problems
adapting to similar channel models. Transfer learning can also in a limited time. For this reason, we choose to leverage
enhance the ability of JSCC schemes to generalize to different linear bound propagation [33], which can handle complex
channel models. However, in real-world scenarios, the channel architectures of NNs while obtaining near-optimal solutions.
environments can vary significantly due to different path losses Specifically, for neurons in the current layer, the method first
and unique fading patterns. The encoder and decoder trained represents their bounds as linear functions of neurons in a
in only one channel model can be hardly applied to another previous layer. Then, it propagates the bounds to the previous
channel model without retraining. Besides, once the encoder sub-layers recursively and finally obtains the output bounds as
and decoder have adapted to a new channel environment linear functions of the perturbed input embeddings. Since the
through transfer learning, it can lead to a degradation or method considers how to bound basic operations in NNs, it is
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
where 𝑓𝑐 is the classification score for class 𝑐 while 𝑓1−𝑐 is 𝑠.𝑡. 𝑝 𝑟 (𝜖) ≥ 𝑝 𝑟𝑡 , ∀𝜖 ≤ 𝜖 𝑈 . (11b)
the one for any other class that is not 𝑐. If 𝛿 > 0, it indicates
Given the mapping relationship from modulation 𝑀 to BER
that the classification score for class 𝑐 is larger than the others
𝜖, we can further acquire the optimal modulation scheme. In
and the sample is classified into class 𝑐.
the next section, we will discuss how to solve this problem in
In semantic communication systems, the TX can obtain the
detail.
feedback about the uplink channel’s SNR and then determine
the modulation scheme or MCS for the transmission. Besides,
the error tolerance of the inference model is monotonic. It IV. P ROPOSED ADAPTIVE MODULATION AND
implies that the inference model is also robust to fewer errors RETRANSMISSION SCHEME
if it is robust to a certain number of errors. Based on the In this section, we propose an algorithm to solve the modu-
statistical property and monotonic error tolerance, we propose lation scheme selection problem. Then, based on the proposed
a new metric named robustness probability to measure the algorithm, we develop an adaptive modulation scheme in
robustness of inference results of semantic communication semantic communication systems. However, when the channel
systems. We denote 𝑝 𝑟 as the robustness probability. Specif- condition becomes too bad, even selecting the lowest mod-
ically, it measures the robustness of the inference result 𝑐˜ ulation order still cannot satisfy the robustness requirement.
corresponding to the received signal X̃. To further express the Therefore, we propose a retransmission mechanism to further
formula of 𝑝 𝑟 , we define a new variable 𝑞𝑈 and formulate the enhance the robustness of semantic inference results. Finally,
following optimization problem: we discuss the generalization capability of our proposed
𝑞𝑈 = max 𝑞, (9a) schemes, which can be extended to other semantic sources
𝑞 and tasks. They can be also extended to downlink scenarios
𝑠.𝑡. 𝛿 = 𝑓𝑐 ( X̃; 𝜃) − max{ 𝑓1−𝑐 ( X̃; 𝜃)} > 0, ∀X̃ ∈ P1,𝑞 . (9b) and integrated with other source coding methods.
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
B. Retransmission Scheme
When the robustness probability requirement cannot be
Fig. 2. The relation between the perturbed samples and the sent samples. satisfied even with the minimum modulation scheme, retrans-
mission is needed to enhance the robustness of the semantic
inference results. As mentioned in Section II.B, the channel
unacceptable for the TX with limited capabilities on storage condition is i.i.d. between frames. We can use the soft-bit
and computation. To tackle this problem, we introduce a much maximal-ratio combining (SBMRC) technique to exploit the
smaller NN 𝐼 (·; W) by mapping X to approximate 𝑞𝑈 , i.e., channel diversity [40]. To be more specific, if sample X
𝑞𝑈 ≈ 𝐼 (X; W). To train 𝐼 (·; W), we first conduct robustness is transmitted for the 𝑇 rounds, all 𝑇 copies of received
verification on the historical data to build the dataset and X̃(𝑡 𝑖 ), 𝑖 = {1, . . . , 𝑇 } can be combined as X̃(𝑇) by the SBMRC
then divide the dataset into a training set and a validation technique at the RX. In uncoded systems, the effective SNR
set. As for sequence features extracted from text or audio, of X̃(𝑇) can be formulated as
we design 𝐼 (·; W) as the sequence-to-sequence structure like 𝑇
∑︁
transformers, recurrent neural networks (RNNs) and pointer 𝛾(𝑇) = 𝑑 2𝑀𝑖 𝛾(𝑡𝑖 ), (12)
networks. While for other non-sequence features extracted 𝑖=1
from images, we can utilize deep neural networks (DNNs) or
convolutional neural networks (CNNs). To control the size of √︄ round, 𝛾(𝑡𝑖 ) is
where 𝑀𝑖 is the modulation order of the 𝑖-th
3 log2 (𝑀𝑖 )
𝐼 (·; W), we can adjust the hidden dimensions to accommodate the SNR of the 𝑖-th round, and 𝑑 𝑀𝑖 = . The
the device requirement. Finally, we choose the mean squared 2(𝑀𝑖 − 1)
error loss (MSELoss), mean absolute error loss (MAELoss), corresponding BER can be bounded by
or Huber loss as the loss function to minimize the gap between
√︁ √︁
𝜏𝑄( 2𝛾(𝑇)) < 𝜖 (𝑇) < 𝑄( 2𝛾(𝑇)), (13)
the predicted 𝑞𝑈 and real 𝑞𝑈 . After successful training on the
server, the well-trained 𝐼 (·; W) model can be deployed to the where 𝜏 is a constant determined by the combinations of 𝑇-
TX for utilization. After that, the TX can obtain the optimal round modulation. While in coded scenarios, the effective SNR
modulation order 𝑀opt based on the sent samples X and the and corresponding BER can also be acquired by experiments.
SNR 𝛾, as shown in Algorithm 1. In our proposed retransmission scheme, the SBMRC tech-
nique is utilized to combine multi-round received signals of
Algorithm 1 Modulation Selection Algorithm different modulation schemes. The BER decreases with the re-
1: Input: Trained parameters W, SNR 𝛾, input samples X = transmission proceeds and therefore improves the performance
[x1 ; . . . ; x 𝑁 ]. of semantic tasks. Since semantic information varies between
2: Acquire 𝑞𝑈 through 𝐼 (·; W). transmitted samples, our proposed retransmission scheme sets
different BER thresholds for different samples. It demonstrates
method to find 𝜖 that satisfies 𝑝 𝑟 =
3: Use the bisection 𝑈 𝑡
that not only channel conditions but also the meaning of
𝑈
𝑞 − E𝜖
1−𝑄 √ . data is considered when deciding the retransmission stop and
Var 𝜖
𝑈
4: Substitute 𝜖 into mapping relation between 𝑀 and 𝜖. modulation scheme selection.
5: Use the bisection method to find 𝑀opt . In order to exploit the waiting channel resource in the
adaptive modulation scheme, we choose to send the signal
using the minimum modulation scheme even it cannot satisfy
According to the proposed modulation scheme selection the robustness requirement. In this case, the optimal modu-
algorithm, we can further propose an adaptive modulation lation scheme is the minimum one. Thus, we re-design the
scheme in semantic communication systems, as shown in Fig. retransmission scheme as shown in Fig. 4 and describe as
3. Specifically, the TX initializes the connection with the RX follows. The TX first initializes the connection with the RX
and then sends a transmission signaling for new samples. before transmission. Then, the TX picks up a sample and
Then the RX feeds the current SNR 𝛾 and desired robustness sends a signaling requesting to transmit it. The RX feeds
probability threshold 𝑝 𝑟𝑡 to the TX. The desired 𝑝 𝑟𝑡 can be back the desired 𝑝 𝑟𝑡 and the TX can obtain 𝑞𝑈 and 𝜖 𝑈
determined by the accuracy requirement. The connection be- based on Algorithm 1. After the RX feeds back the SNR
tween the accuracy and 𝑝 𝑟𝑡 can be obtained from the historical information of the 𝑖-th round, 𝛾(𝑡 𝑖 ), the TX can obtain the
data. With the help of Algorithm 1, the TX gets 𝑞𝑈 and 𝜖 𝑈 . optimal modulation, 𝑀opt . Then, the TX transmits the data
Also, the TX calculates the minimum BER 𝜖 min by using the using the chosen modulation scheme or MCS. The effective
given feedback SNR and assuming the minimum modulation SNR 𝛾(𝑇) and effective BER 𝜖 (𝑇) can be further obtained.
scheme. If the minimum BER still cannot satisfy the BER Since one-time transmission may not satisfy the robust-
requirement, the TX waits for better channel conditions to ness requirement, the TX acquires the current robustness
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
probability 𝑝 𝑟 based on 𝜖 (𝑇) and Eq. (10). Then, the TX example, we can utilize 0-norm to measure the difference be-
checks whether 𝑝 𝑟 exceeds the threshold 𝑝 𝑟𝑡 . If 𝑝 𝑟 < 𝑝 𝑟𝑡 , tween received and sent bits. Then, Eq. (5) can be substituted
the TX continues to ask for SNR feedback and repeats the by ∥ z̃ − z∥ 0 ≤ 𝑞. After that, we can obtain the corresponding
procedure mentioned before. After the calculated 𝑝 𝑟 exceeds 𝑞𝑈 and analyze the distribution of ∥ z̃ − z∥ 0 to measure 𝑝 𝑟 in
the threshold 𝑝 𝑟𝑡 , the TX sends a stop signaling and the RX a similar way.
utilizes the SBMRC technique to combine the signals from In summary, the proposed schemes can be generalized to
all previous rounds. If the retransmission round 𝑇 exceeds the other semantic sources like images and videos, and other tasks
maximum allowed retransmission round 𝑇max , the TX stops the like regression and reconstruction. They can be also extended
retransmission and initiates a new transmission. Otherwise, the to various wireless scenarios and other source coding methods,
RX utilizes the combined signals to do inference. such as Huffman coding.
V. S IMULATION RESULTS
C. Generalization Discussion
In this section, we verify that the performance of semantic
Although we focus on the text classification task for se-
tasks can be guaranteed by properly selecting the robustness
mantic communication systems in this paper, the proposed
probability threshold. Besides, we show that the proposed
schemes can be easily extended to other semantic sources
schemes can achieve a higher data rate compared with the
and tasks. To be specific, the proposed schemes are mainly
traditional schemes given the same performance of semantic
according to the methods in [33] to first obtain the maximum
tasks.
tolerant perturbation 𝑞𝑈 and further determine the appro-
priate modulation scheme based on 𝑞𝑈 . Since linear bound
propagation is a universal robustness verification framework A. Simulation Settings
that can tackle various NNs, it can be easily applied in We use Stanford Sentiment Treebank (SST) dataset [41]
NNs that process other semantic sources like images and to execute binary sentiment analysis. It consists of 67, 349
videos. The proposed schemes can also generalize to other training samples, 872 validation samples, and 1, 892 test
semantic tasks, such as regression and reconstruction tasks. samples. Each sample is a sentence labeled with two feelings:
In classification tasks, 𝑞𝑈 is measured with regard to the positive or negative. We train a one-layer transformer using the
unchanged label. We can also define the maximum tolerant cross-entropy loss function with a hidden size of 64 for both
output perturbation and then obtain 𝑞𝑈 for the regression tasks. the embedding layer and the self-attention layers. The self-
While for reconstruction tasks, we can first transfer the quality- attention layers have four heads, and the feed-forward layers
of-service (QoS) requirements to the actual maximum output have a hidden size of 128. We divide the network into two
perturbation of NNs. Then, we can obtain 𝑞𝑈 in a similar way. parts at the embedding layer, resulting in a feature dimension
The proposed schemes can be also extended to the downlink of 𝐷 = 64. Fig. 5 shows the detailed structure of NNs at
systems by exchanging the functions on the TX and the RX. the TX and RX. To avoid the impact caused by classification
Besides, though we utilize NNs to extract features from errors, we select samples to let the TX only transmit correctly-
semantic source, the proposed schemes can be generalized to classified ones. It means that one can achieve an accuracy
other source coding methods. Taking Huffman coding as an of 100% under perfect channel conditions. For small NN
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
𝐼 (·; W), we simply utilize a single-head self-attention layer system model, the total information bits of the sent sample,
and a feed forward layer with a hidden size of 8 to estimate denoted as 𝐿, equals to 𝑁 𝐷𝐾. The transmission rate can be
𝑞𝑈 2 . We choose Huber loss with parameter 𝛽 = 0.5 as loss 𝐿
correspondingly obtained as 𝑅 = . Besides, optional modu-
function since it achieves fast convergence while decreasing 𝑡
lation schemes in uncoded and coded semantic communication
the impacts of outliers.
systems are shown in Table I. The MCS in coded system
As for the wireless communication settings, we utilize the is designed with reference to the IEEE 802.11ac protocol
wireless communication model mentioned in Section II.B. [42]. We utilize low-density parity-check (LDPC) codes with
Specifically, we utilize the Rayleigh fading and the channel a block size of 64, 800 as the coding method.
gain is modeled as a complex random Gaussian vector. We
consider the quantization number 𝐾 as 10. It is an appropriate
TABLE I
value since it leads to a negligible quantization error. At O PTIONAL M ODULATION S CHEMES IN U NCODED AND C ODED S EMANTIC
the same time, it causes low computational complexity of C OMMUNICATION S YSTEMS .
encoding and decoding, and low storage space consumption.
Uncoded Coded
Note that the selection of 𝐾 does not affect the usage of our Index Modulation Index Modulation Code Rate
methods. We set the bandwidth as 4 MHz and the duration 1 QPSK 1/2
1 QPSK
time of each frame is 10 ms. At the beginning of each frame, 2 QPSK 3/4
the TX obtains the channel feedback and chooses the sample 3 16-QAM 1/2
2 16-QAM
to transmit. The transmission continues until the transmission 4 16-QAM 3/4
5 64-QAM 2/3
success. Since the channel estimation time is much smaller 3 64-QAM 6 64-QAM 3/4
than the data transmission time, we ignore this part of time 7 64-QAM 5/6
consumption. 8 256-QAM 3/4
4 256-QAM
Fig. 6 shows the transmission procedure of the proposed 9 256-QAM 5/6
adaptive modulation scheme and retransmission scheme. For
the adaptive modulation scheme, the TX waits until the chan-
nel condition becomes good enough to achieve the robustness B. Impact of Robustness Probability Threshold on Accuracy
requirement through one-time transmission. Thus, the duration
time, denoted as 𝑡, consists of waiting frames and one-time 1) Uncoded System: First, we test the performance of
transmission. While the retransmission scheme retransmits the semantic tasks, measured by the average classification ac-
sample with the minimum modulation scheme even though the curacy, and also record the average BER, as the robustness
current channel condition is too bad to achieve the robustness probability threshold, 𝑝 𝑟𝑡 , increases from 0 to 1 in the uncoded
requirement. In this way, 𝑡 includes the last 𝑇 − 1 frames and semantic communication system. The results for the proposed
the 𝑇-th retransmission time. Note that a higher modulation adaptive modulation scheme and retransmission scheme are
scheme leads to a shorter transmission time. Based on the summarized in Table II(a) and Table II(b), respectively.
From the tables, the average accuracy increases as 𝑝 𝑟𝑡 in-
2 Although this is an estimated value, our simulation results show that it creases and finally converges to 100% under all SNR settings.
has an excellent performance. Also, the average BER decreases as 𝑝 𝑟𝑡 increases for all
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
Fig. 6. The transmission procedure of the adaptive modulation scheme and retransmission scheme.
TABLE II
T HE AVERAGE ACCURACY OF THE SEMANTIC TASK AND THE AVERAGE BER WITH DIFFERENT SNR S IN THE UNCODED SEMANTIC COMMUNICATION
SYSTEM .
SNRs. It is because that the proposed schemes would select is 71.10% when SNR=0dB and 𝑝 𝑟𝑡 = 0. It seems relatively
lower modulation orders under the same channel conditions high since we normalize the accuracy and therefore the overall
as 𝑝 𝑟𝑡 increases. It is a clue to the fact that the perturbed accuracy is increased a lot. Also, the connection between
samples approximate to the sent ones, therefore increasing the performance of semantic tasks and wireless conditions
the classification accuracy. This result demonstrates that the highly relies on both the dataset and NN models. From
performance of semantic tasks can be guaranteed by setting our experiment results, some samples are far away from the
an appropriate 𝑝 𝑟𝑡 . We can also see that the average accuracy decision boundary of NNs and therefore can be still classified
increases with the increase of SNR when 𝑝 𝑟𝑡 equals to 0. The correctly even in harsh channel conditions. When the channel
reason is that there is no robustness probability requirement condition becomes better, the average BER becomes lower
when 𝑝 𝑟𝑡 = 0. Therefore, the TX would choose the maximum under the same modulation scheme and the gap between X̃
modulation scheme to send all samples. The average accuracy and X becomes smaller, leading to the improvement on the
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
10
average accuracy. system that the average BER decreases with 𝑝 𝑟𝑡 . Besides,
Additionally, comparing Table II(b) with Table II(a), we the average accuracy increases with 𝑝 𝑟𝑡 and increases more
can see that the average accuracy increases more flattened smoothly in the retransmission scheme. The results also show
as 𝑝 𝑟𝑡 increases with the proposed retransmission scheme that the average accuracy increases with SNR given 𝑝 𝑟𝑡 = 0.
under harsh channel conditions. The reason responsible for this The reasons for these are consistent with the discussion in the
phenomenon is that the average robustness probability under uncoded settings.
retransmission scheme is lower than that under the adaptive However, in contrast to the uncoded semantic commu-
modulation scheme. Specifically, the proposed retransmission nication system, the average accuracy is higher given the
scheme requires multiple retransmission rounds to exceed 𝑝 𝑟𝑡 same 𝑝 𝑟𝑡 and converges more rapidly to 100%. Take 𝑝 𝑟𝑡 =
while there is only one-time transmission under the adaptive 0 as an example. The average accuracy for 0dB, 5dB,
modulation scheme. Considering that the optional modulation 10dB, 15dB and 20dB are 71.10%, 76.02%, 82.98%, 91.34%
schemes are finite and the selected one must satisfy the and 96.68% for uncoded systems in Table II(a), while
robustness requirement, the average robustness probability 71.34%, 76.64%, 86.08%, 94.02% and 97.72% for coded sys-
under the retransmission scheme is closer to that under the tems in Table V(a). This is because additional error correction
actual setting 𝑝 𝑟𝑡 . coding can achieve much lower BER in the coded system than
Here, we show how a proper 𝑝 𝑟𝑡 can guarantee the accurate in the uncoded system. Even in the case of low robustness re-
classification result through imperfect transmission in a more quirements, the actual choice of MCS can achieve much lower
intuitive way. We set 𝑝 𝑟𝑡 to 0.9 under which all the samples can error probabilities than the corresponding BER requirements.
be correctly classified. We obtain the embedding representa-
tions of all tokens and then compare the received feature with C. Performance of Transmission Rate
these embeddings. Then, we select the token whose embedding
is the closest to the received embedding as the sent word. In this part, we test the performance of the proposed
We then compare the words sent and received, as well as schemes with different SNRs in both uncoded and coded se-
the maximum tolerant BER 𝜖 𝑈 under the proposed schemes, mantic communication systems. Based on the relation between
which are summarized in Tables III and IV. We bold the the average accuracy and the robustness probability threshold
inconsistencies between sent and italicize words that express shown in Table II and Table V, we then utilize the binary
strong emotions. search to find the minimum 𝑝 𝑟𝑡 that satisfies the accuracy
From Table III, we can find that there exists redundancy requirement for each SNR.
in the sent samples. That is, even if the samples cannot be
correctly recovered without errors, they can still be classified
correctly since the NN can capture semantic information
Pro osed AM (100%)
from different sentences. In addition, 𝜖 𝑈 acquired by setting 4 Proposed Retran (100%)
Traditional AM (100%)
appropriate 𝑝 𝑟𝑡 can indicate the semantics of transmitted sen- Traditional Retran (100%)
Average transmission rate (bit/s/Hz)
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
11
TABLE III
C OMPARISONS B ETWEEN THE S ENDING AND R ECEIVING W ORDS UNDER A DAPTIVE M ODULATION S CHEME IN THE U NCODED S EMANTIC
C OMMUNICATION S YSTEM
TABLE IV
C OMPARISONS B ETWEEN THE S ENDING AND R ECEIVING W ORDS UNDER R ETRANSMISSION S CHEME IN THE U NCODED S EMANTIC C OMMUNICATION
S YSTEM
TABLE V
T HE AVERAGE ACCURACY OF THE SEMANTIC TASK AND THE AVERAGE BER WITH DIFFERENT SNR S IN THE CODED SEMANTIC COMMUNICATION
SYSTEM .
rates of the proposed adaptive modulation and retransmission contain relatively less semantic information.
schemes in comparison with baseline algorithms for varying Besides, the proposed retransmission scheme can achieve a
SNRs and varying accuracy requirements. higher transmission rate than the adaptive modulation scheme.
From Fig. 7, we can find that the proposed adaptive mod- It is because that the retransmission scheme effectively uti-
ulation scheme achieves a higher average transmission rate lizes the channel resources that are wasted by the adaptive
than the traditional scheme. The same conclusion can be modulation scheme when the robustness requirement cannot
drawn for the retransmission scheme as well. The reason is be satisfied by the minimum modulation scheme. Since some
that the proposed schemes take into account the differences samples have strict BER requirements, there still exists the
between samples. We can use a low modulation order to case that we have to retransmit the samples for multiple
protect the samples with more semantic information, while rounds especially when the channel experiences deep fading
a high-order modulation can be used to transmit samples that even when SNR=20dB. Thus, the transmission rate of the
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
12
retransmission scheme is still slightly higher than that of the time transmission can already meet the robustness requirement
adaptive modulation scheme when SNR=20dB. However, it contrast to multiple transmission rounds in the uncoded sys-
also demonstrates that the retransmission scheme consumes tem. However, the error correction capability does not come
more energy. When SNR is low, the improvements of the for free. The performance enhancement at low SNRs is paid
proposed schemes are not significant. It is because that the by the decrease in data rate per frame. At high SNRs, the
additional waiting and retransmission time is much longer than uncoded system can already achieve low BER using existing
the saved time of the last round transmission. Some points are modulation schemes, while low data rate MCS in the coded
not plotted, since the average accuracy has already exceeded system hinders the increase of transmission rate.
the accuracy requirement even selecting the maximum modu-
lation scheme for these SNRs. D. Performance Gain Analysis
P(ε > E)
2.0
(2.82e-03,0.46)
1.5 0.4
1.0
0.2
0.5 prt=0.1
prt=0.5
0.0 0.0 prt=0.9
0 5 10 15 20 10−5 10−4 10−3 10−2
SNR (dB) E
Fig. 8. Average transmission rates of the proposed adaptive MCS and coded Fig. 9. The proportion of the maximum BER that can be allowed for the
retransmission scheme compared to baseline and uncoded schemes, when transmitted samples with different robustness probability thresholds.
average accuracy is 100%.
To further illustrate the performance gain, we plot the
2) Coded System: Since coded transmission has high relia- proportion of transmitted samples that can withstand the max-
bility, we choose accuracy requirement as 100% and the base- imum BER at various robustness probability thresholds. The
line algorithms adopt the maximum MCS under the premise of results are summarized in Fig. 9. From the figure, the marked
perfect bit transmission. We further put the result of uncoded point means that if the BER threshold is set as 0.00282, 46%
schemes given average accuracy equals to 100% to compare of the total samples can satisfy the BER requirement given
their rates variation. The results are summarized in Fig. 8. 𝑝 𝑟𝑡 = 0.9. From the figure, the BER requirement for the same
The results show that the proposed coded schemes outperform sample also increases as 𝑝 𝑟𝑡 grows. It is because increasing 𝑝 𝑟𝑡
their baseline algorithms, respectively, indicating the ability means that the perturbed samples are more likely to appear in
to generalize on the coded schemes. The same explanations the same classification space as the initial samples. As a result,
can be found in the uncoded system as mentioned above. we have to reduce the BER to achieve more robustness.
We also find that the proposed coded retransmission scheme Besides, given the same 𝑝 𝑟𝑡 , different samples have different
achieves a little bit higher transmission rate than the proposed BER requirements due to various semantic information. How-
MCS. The performance gain comes from the utilization of ever, the traditional method assigns the same BER requirement
waiting channel resources. However, since the average number to all samples. If the BER requirement is not set to the lowest
of transmission rounds approaches one, the diversity gain from tolerable BER among the samples, then some samples are
combining multiple rounds is limited. subject to misclassification, since samples rich in semantic in-
However, the transmission rate increases more smoothly formation need more stringent protection during transmission.
with SNR in the coded system than in the uncoded system, In contrast, the transmission rate of some samples with little
since the coded system increases the number of optional semantic information is reduced if the lowest tolerant BER is
modulation schemes. In addition, the proposed MCS and set. Thus, the traditional method cannot make a fair balance
coded retransmission scheme show higher transmission rates between the accuracy and transmission rate, which explains
at low SNRs but lower transmission rates at high SNRs. The the performance gain.
result verifies the impact of modulation scheme combinations
on the transmission rate. Since error correction coding reduces VI. C ONCLUSIONS
the BER, the coded system does not need to take advantages In this paper, we mainly studied the adaptive modulation
of diversity gain in fading. Given enough bandwidth, one- and retransmission scheme for semantic communication sys-
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
13
Í𝐷
tems, which adapted the transmission rate over time-varying the distribution of 𝑑=1 | 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 | approximates the normal
channels. We focused on the inference stage of NNs, rather distribution, i.e.,
than how to train feature selection NNs. It empowered our 𝐷
∑︁
scheme to generalize across diverse semantic sources, dy- | 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 | ∼ N (𝐷 E(| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 |), 𝐷 Var(| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 |)). (18)
namic channel statistics, and multiple semantic tasks without 𝑑=1
joint-retraining. To be more specific, we first used robust- Thus, we have
ness verification to bridge between wireless transmission and
𝐷 max{|𝑥 𝑛𝑑 |} 𝐷 (max{|𝑥 𝑛𝑑 |}) 2
task performance. The robustness probability threshold was ∥ x̃𝑛 − x𝑛 ∥ 1 ∼ N (
𝑛,𝑑
E(| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 |),
𝑛,𝑑
Var(| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 |)) .
proposed to guarantee the performance of semantic tasks. 2𝐾 −1 (2𝐾 − 1) 2
(19)
Next, we formulated and resolved the challenge of modulation
scheme selection with the help of the proposed robustness
probability threshold. Based on this, we further designed the R EFERENCES
adaptive modulation and retransmission schemes to improve [1] W. Weaver, “Recent contributions to the mathematical theory of commu-
the transmission rate compared to the traditional schemes. nication,” ETC: A Review of General Semanics, pp. 261–281, 1953.
Finally, simulation results demonstrated that the proposed [2] D. Gündüz, Z. Qin, I. E. Aguerri, H. S. Dhillon, Z. Yang, A. Yener, K. K.
Wong, and C. -B. Chae, “Beyond transmitting bits: Context, semantics,
schemes outperformed the baseline methods, which adapted and task-oriented communications,” IEEE J. Sel. Areas Commun., vol.
transmission rates depending on semantic information behind 41, no. 1, pp. 5–41, Jan. 2023.
the data. The proposed schemes shed lights on the adaptive rate [3] Q. Lan, D. Wen, Z. Zhang, Q. Zeng, X. Chen, P. Popovski, and K. Huang,
“What is semantic communication? A view on conveying meaning in the
control for practical machine learning enabled communication era of machine intelligence,” J. Commun. Netw., vol. 6, no. 4, pp. 336–
systems. 371, Dec. 2021.
[4] X. Luo, H. -H. Chen, and Q. Guo, “Semantic Communications: Overview,
open Issues, and future research directions,” IEEE Wireless Commun., vol.
A PPENDIX A 29, no. 1, pp. 210–219, Feb. 2022.
P ROOF OF THE STATISTICAL PROPERTY OF THE [5] H. Xie, Z. Qin, G. Y. Li, and B. -H. Juang, “Deep learning enabled
DISTORTION BETWEEN THE RECEIVED AND SENT semantic communication systems,” IEEE Trans. Signal Process., vol. 69,
pp. 2663–2675, Apr. 2021.
FEATURES [6] L. Yan, Z. Qin, R. Zhang, Y. Li, and G. Y. Li, “Resource allocation for
Given the quantization in Eq. (1), ∥ x̃𝑛 − x𝑛 ∥ 1 ≤ 𝑞 can be text semantic communications,” IEEE Wireless Commun. Lett., vol. 11,
no. 7, pp. 1394–1398, Jul. 2022.
reformulated as [7] D. B. Kurka and D. Gündüz, “DeepJSCC-f: Deep joint source-channel
max{|𝑥 𝑛𝑑 |} ∑︁ coding of images with feedback,” IEEE Trans. Inf. Theory, vol. 1, no. 1,
𝐷
𝑛,𝑑 pp. 178–193, May 2020.
| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 | ≤ 𝑞, ∀𝑛, 𝑑, (14) [8] M. Yang, C. Bian, and H.-S. Kim, “Deep joint source channel coding for
2𝐾 − 1 𝑑=1 wireless image transmission with OFDM,” in IEEE ICC 2021, online,
Jun. 2021, pp. 1–6.
where 𝑔˜ 𝑛𝑑 = 𝐾
Í 𝑘 𝑘,𝑑 and 𝑔 𝑑 = Í𝐾 2 𝑘 𝑜 𝑘,𝑑 .
𝑘=1 2 𝑜˜ 𝑛 𝑛 𝑘=1 𝑛 [9] M. Jankowski, D. Gündüz, and K. Mikolajczyk, “Deep joint source-
To analyze the distribution of the left part of inequality (14), channel coding for wireless image retrieval,” in IEEE ICASSP 2020,
Í 𝑘,𝑑 Barcelona, Spain, May 2020, pp. 5070–5074.
we introduce the number of error bits as 𝑒 𝑛𝑑 = 𝐾 𝑘=1 𝑛 −
| ˜
𝑜 [10] Z. Weng and Z. Qin, “Semantic communication systems for speech
𝑜 𝑛𝑘,𝑑 | ∈ {0, . . . , 𝐾 }. We denote the 𝑗-th error situation that transmission,” IEEE J. Sel. Areas Commun., vol. 39, no. 8, pp. 2434–
𝑑,𝑒 𝐾 2444, Aug. 2021.
𝑔𝑛𝑑 has 𝑒 𝑛𝑑 errors as 𝑔˜ 𝑛, 𝑗 , 𝑗 ∈ {1, . . . , 𝑒𝑛𝑑 }. For example, if [11] F. Zhai, Y. Eisenberg, and A. K. Katsaggelos, “Joint source-channel
𝐾 = 3, 𝑒 𝑛𝑑 = 1 and 𝑔𝑛𝑑 = 0(𝑜 1,𝑑 2,𝑑 3,𝑑
𝑛 𝑜 𝑛 𝑜 𝑛 = 000), there are three coding for video communications,” Handbook Image Video Process.,
error situations, i.e., 2( 𝑜˜ 𝑛 𝑜˜ 𝑛 𝑜˜ 𝑛 = 001), 4( 𝑜˜1,𝑑
1,𝑑 2,𝑑 3,𝑑 2,𝑑 3,𝑑
𝑛 𝑜˜ 𝑛 𝑜˜ 𝑛 =
2005, pp. 1065–1082.
1,𝑑 2,𝑑 3,𝑑 [12] Q. Hu, G. Zhang, Z. Qin, Y. Cai, G. Yu, and G. Y. Li “Ro-
010), and 8( 𝑜˜ 𝑛 𝑜˜ 𝑛 𝑜˜ 𝑛 = 100). Then, due to i.i.d. channel bust semantic communications with masked VQ-VAE enabled code-
impairments, the expectation of | 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 | can be expressed as book.” IEEE Trans. Wireless Commun., early access, Apr. 12, 2023,
doi:10.1109/TWC.2023.3265201.
𝐾 −1
2∑︁ 𝐾 ( 𝑒𝐾𝑛𝑑 ) [13] G. Zhang, Q. Hu, Z. Qin, Y. Cai, and G. Yu, “A unified multi-
∑︁ ∑︁ 1 task semantic communication system with domain adaptation,” in IEEE
𝑑,𝑒
E(| 𝑔˜ 𝑛𝑑 − 𝑔𝑛𝑑 |) = 𝑝(𝑔𝑛𝑑 ) 𝑝(𝑒 𝑛𝑑 ) 𝐾
| 𝑔˜ 𝑛, 𝑑
𝑗 − 𝑔 𝑛 |, GLOBECOM, Rio de Janeiro, Brazil, Dec. 2022, pp. 3971–3976.
𝑔𝑛𝑑 =0 𝑒𝑛𝑑 =0 𝑗=1 𝑒𝑛𝑑 [14] E. Bourtsoulatze, D. Burth Kurka, and D. Gündüz, “Deep joint source
(15) channel coding for wireless image transmission,” IEEE Trans. Cogn.
Commun. Netw., vol. 5, no. 3, pp. 567–579, Sep. 2019.
where 𝑝(𝑒 𝑛𝑑 ) = 𝑒𝐾𝑛𝑑 𝜖 𝑒𝑛 (1 − 𝜖) 𝐾 −𝑒𝑛 is the probability of
𝑑 𝑑
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Cognitive Communications and Networking. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCCN.2023.3315386
14
[21] H. Xie, Z. Qin, and G. Y. Li, “Semantic communication with memory.” Huiguo Gao Huiguo Gao received the B.S. degree in
arXiv preprint arXiv:2303.12335, Mar. 2023. information engineering from Zhejiang University,
[22] M. Ding, J. Li, M. Ma, and X. Fan, “SNR-adaptive deep joint source- Hangzhou, China, in 2020. He is currently pursuing
channel coding for wireless image transmission,” in IEEE ICASSP 2021, the Ph.D. degree with the College of Information
Toronto, Ontario, Canada, Jun. 2021, pp. 1555–1559. Science and Electronic Engineering, Zhejiang Uni-
[23] Q. Zhou, R. Li, Z. Zhao, Y. Xiao, and H. Zhang, “Adaptive bit rate versity. His current research interests mainly include
control in semantic communication with incremental knowledge-based machine learning and wireless communications.
HARQ,” IEEE Open J. Commun. Soc., vol. 3, pp. 1076–1089, Jul. 2022.
[24] P. Jiang, C. -K. Wen, S. Jin, and G. Y. Li, “Deep source-channel coding
for sentence semantic transmission with HARQ,” IEEE Trans. Commun.,
vol. 70, no. 8, pp. 5225–5240, Aug. 2022.
[25] G. I. Parisi, R. Kemker, J. L. Part, C. Kanan, and S. Wermter, “Continual
lifelong learning with neural networks: A review,” Neural Networks, vol.
113, pp. 54–71, Feb. 2019.
[26] M. McCloskey and N. J. Cohen, “Catastrophic interference in connec-
tionist networks: The sequential learning problem,” Psychol. Learn Motiv., Guanding Yu (S’05-M’07-SM’13) received the B.E.
Elsevier, 1989, vol. 24, pp. 109–165. and Ph.D. degrees in communication engineering
[27] R. R. Bunel, I. Turkaslan, P. Torr, P. Kohli, and P. K. Mudigonda, “A from Zhejiang University, Hangzhou, China, in 2001
unified view of piecewise linear neural network verification,” in Proc. and 2006, respectively. He joined Zhejiang Uni-
Adv. Neural Inf. Process. Syst. (NeurIPS), Montreal, Canada, Dec. 2018, versity in 2006, and is now a Professor with the
pp. 4795–4804. College of Information and Electronic Engineering.
[28] V. Tjeng, K. Xiao, and R. Tedrake, ”Evaluating robustness of From 2013 to 2015, he was also a Visiting Professor
neural networks with mixed integer programming,” arXiv preprint at the School of Electrical and Computer Engi-
arXiv:1711.07356, Nov. 2017. neering, Georgia Institute of Technology, Atlanta,
[29] G. Katz, C. Barrett, D. L. Dill, K. Julian, and M. J. Kochenderfer, “Re- GA, USA. His research interests include integrated
luplex: An efficient SMT solver for verifying deep neural networks,” in sensing and communications (ISAC), mobile edge
Proc. Int. Conf. Comput.-Aided Verification (CAV), Heidelberg, Germany, computing/learning, and machine learning for wireless networks.
Jul. 2017, pp. 97–117. Dr. Yu has served as a guest editor of IEEE Communications Magazine
[30] M. Lee, G. Yu, and H. Dai, “Decentralized inference with graph special issue on Full-Duplex Communications, an Editor of IEEE Journal
neural networks in wireless communication systems,” IEEE Trans. Mob. on Selected Areas in Communications Series on Green Communications
Comput., vol. 22, no. 5, May 2023, pp. 2582–2598. and Networking, and Series on Machine Learning in Communications and
[31] T. Gehr, M. Mirman, D. Drachsler-Cohen, P. Tsankov, S. Chaudhuri, and Networks, an Editor of IEEE Wireless Communications Letters, a lead
M. Vechev, “AI2: Safety and robustness certification of neural networks Guest Editor of IEEE Wireless Communications Magazine special issue on
with abstract interpretation,” in Proc. IEEE Symp. Secur. Privacy (SP), LTE in Unlicensed Spectrum, an Editor of IEEE Transactions on Green
San Francisco, California, USA, May 2018, pp. 3–18. Communications and Networking, and an Editor of IEEE Access. He is
[32] Matthias Hein and Maksym Andriushchenko, “Formal guarantees on the now serving as an editor of IEEE Transactions on Machine Learning in
robustness of a classifier against adversarial manipulation.” in Proc. Adv. Communications and Networking. He received the 2016 IEEE ComSoc
Neural Inf. Process. Syst. (NeurIPS), Long Beach, California, USA, Dec. Asia-Pacific Outstanding Young Researcher Award. He regularly sits on the
2017, pp. 2266–2276. technical program committee (TPC) boards of prominent IEEE conferences
[33] Z. Shi, H. Zhang, K.-W. Chang, M. Huang, and C.-J. Hsieh, “Robustness such as ICC, GLOBECOM, and VTC. He also serves as a Symposium Co-
verification for transformers,” in Int’l. Conf. Learn. Represent. (ICLR), Chair for IEEE Globecom 2019 and a Track Chair for IEEE VTC 2019’Fall.
online, Apr. 2020, pp. 1–22.
[34] Y. Kang, J. Hauswald, C. Gao, A. Rovinski, T. Mudge, J. Mars, and L.
Tang, “Neurosurgeon: Collaborative intelligence between the cloud and
mobile edge,” ACM SIGARCH Comput. Archit. News, vol. 45, no. 1, pp.
615–629, Apr. 2017.
[35] D. R. Pauluzzi and N. C. Beaulieu, “A comparison of SNR estimation
techniques for the AWGN channel,” IEEE Trans. Commun., vol. 48, no.
10, pp. 1681–1691, Oct. 2000. Yunlong Cai (S’07–M’10–SM’16) received the
[36] H. Ye, G. Y. Li, and B. -H. Juang, “Power of deep learning for channel Ph.D. degree in electronic engineering from the Uni-
estimation and signal detection in OFDM systems,” IEEE Wireless versity of York, U.K., in 2010. From 2010 to 2011,
Commun. Lett., vol. 7, no. 1, pp. 114–117, Feb. 2018. he was a Postdoctoral fellow with the Electronics
[37] J. Lu, K. B. Letaief, J. C.-I. Chuang, and M. L. Liou, “M-PSK and and Communications Laboratory, CNAM, France.
M-QAM BER computation using signal-space concepts,” IEEE Trans. Since February 2011, he has been with the College
Commun., vol. 47, no. 2, pp. 181–184, Feb. 1999. of Information Science and Electronic Engineering,
[38] J. Hou, P. H. Siegel, and L. B. Milstein, “Performance analysis and Zhejiang University, Hangzhou, China, where he is
code optimization of low density parity-check codes on Rayleigh fading currently a Professor. He has also held research vis-
channels,” IEEE J. Sel. Areas Commun., vol. 19, no. 5, pp. 924–934, May iting appointments at Georgia Institute of Technol-
2001. ogy, McGill University, and University of California
[39] P. Frenger, S. Parkvall, and E. Dahlman, “Performance comparison of Irvine. His research interests include transceiver design for multiple-antenna
HARQ with chase combining and incremental redundancy for HSDPA,” systems, cooperative and relay communications, UAV communications, and
in IEEE VTC Fall 2001, Atlantic City, New Jersey, USA, Oct. 2001, vol. machine learning for communications. He has published over 200 journal and
3, pp. 1829–1833. conference papers in these areas.
[40] A. Bin Sediq and H. Yanikomeroglu, “Performance analysis of soft-bit Dr. Cai currently serves as an Associate Editor for IEEE Transactions
maximal ratio combining in cooperative relay networks,” IEEE Trans. on Communications and a Senior Area Editor for IEEE Signal Processing
Wireless Commun., vol. 8, no. 10, pp. 4934–4939, Oct. 2009. Letters. He is the Lead Guest Editor of the special issue on “Next Generation
[41] R. Socher, A. Perelygin, J. Y. Wu, J. Chuang, C. D. Manning, A. Y. Advanced Transceiver Technologies” of the IEEE Journal on Selected Areas
Ng, and C. Potts, “Recursive deep models for semantic compositionality in Communications. He was an Associate Editor for IEEE Signal Processing
over a sentiment treebank,” in Proc. Conf. Empirical Methods Natural Letters from 2018 to 2023. He has served as the General Chair for the eigh-
Language Process., Seattle, Washington, USA, Oct. 2013, pp. 1631–1642. teenth IEEE International Symposium on Wireless Communications Systems,
[42] Eng Hwee Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, and which was held in Hangzhou, in October 2022. He regularly sits on the
T. Nihtilä, “IEEE 802.11ac: Enhancements for very high throughput technical program committee boards of prominent IEEE conferences, such
WLANs,” in IEEE PIMRC, Toronto, Canada, Sep. 2011, pp. 849–853. as ICC, GLOBECOM, and VTC.
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on December 27,2023 at 05:26:08 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.