AIGC-Empowered Covert Communications for Scalable Information Systems
SPECIAL ISSUE ON: AIGC-Empowered Covert Communications for Scalable Information Systems
SCOPE: The rapid advancements in artificial intelligence (AI), particularly through the use of large-scale models and AI-generated content (AIGC) techniques, have led to groundbreaking innovations across various domains. One emerging area that has seen significant potential is covert communications, which plays a pivotal role in ensuring secure and stealthy information exchange in modern scalable information systems. Covert communications, which involve hiding the presence of communication from unintended observers, can provide critical security solutions in scenarios where data privacy and secrecy are paramount.In this context, AIGC-powered models offer a powerful tool for enhancing covert communication strategies. These models enable the creation of sophisticated, adaptive communication schemes that are optimized for both covert transmission and the seamless integration of various communication protocols. AIGC can aid in generating content and patterns that are imperceptible to adversaries, providing a high degree of confidentiality and security. Moreover, the scalability of big models ensures that such strategies can be implemented effectively across large and dynamic systems, such as distributed computing networks, industrial IoT, and mobile communication systems.
Despite the vast potential, several key challenges persist in the development of AIGC-empowered covert communications for scalable information systems. One major challenge is designing covert communication protocols that are both efficient and resistant to detection by unauthorized entities. Another critical issue lies in developing scalable and adaptive methods for training AIGC models, ensuring that these models can operate effectively in resource-constrained environments while maintaining the security and integrity of the communication. Additionally, the integration of AIGC in covert communication systems must consider issues such as system robustness, data integrity, and the seamless interaction between communication protocols and the underlying network infrastructure.
TOPICS:
Potential topics include but are not limited to the following:
1-Design of covert communication protocols using AIGC models
2-Scalable AIGC-powered covert communication systems for secure information exchange
3-Machine learning-based detection evasion techniques in covert communication networks
4-Resource management and optimization for AIGC-empowered scalable information systems
5-Privacy-preserving communication schemes enabled by AIGC models
6-Integration of AIGC-driven covert communication in industrial IoT networks
7-Real-time covert data transmission using adaptive AIGC models
8-Threat detection and mitigation in AIGC-powered scalable information systems
9-Secure information hiding techniques in the presence of large-scale models
10-Applications of AIGC, industrial IoT networks
IMPORTANT DATES
- Manuscript submission deadline: June-1-2025
- Notification of acceptance: Aug-28-2025
- Submission of final revised paper: Oct-30-2025
- Publication of special issue (tentative): Dec-30-2025
MAIN GUEST EDITOR:
Lisheng Fan, Guangzhou University, lsfan@gzhu.edu.cn
GUEST EDITORS:
Xiang Chen, Sun Yat-sen University, Guangzhou, China, chenxiang@mail.sysu.edu.cn
Panagiotis D. Diamantoulakis, Aristotle University of Thessaloniki, padiaman@ieee.org