Deep Learning-based Techniques for Integrated Sensing and Communication Systems: State-of-the-Art, Challenges, and Opportunities

Murat Temiz1 2, Yongwei Zhang3, Yanwei Fu\(^\ddagger\), Chi Zhang\(^\ddagger\), Chenfeng Meng\(^\ddagger\),
Orhan Kaplan4, Christos Masouros\(^*\)


Figure 1: image.

1 Introduction↩︎

Integrated sensing and communication (ISAC) has emerged as a key technology for future-generation wireless networks such as 6G and beyond. Delivering both radar sensing and wireless communication functions using the same waveform and hardware reduces radio spectrum congestion and the amount of hardware used and improves the energy efficiency of the networks. ISAC systems can utilize various waveforms to provide both sensing and communication, depending on the primary function of the system. For instance, communication waveforms can be optimized to enable some degree of sensing capabilities without significantly reducing communication performance. This will enable the communication network and devices to perform sensing while communicating with each other. On the other hand, sensing waveforms can also be employed to provide communication by embedding communication data in these signals.

While ISAC provides significant advantages over current sensing and communication networks, the design and implementation of ISAC systems can be challenging, especially in terms of signal processing and computational complexity. Because combining both systems requires solving optimization problems for generating the optimum waveform or processing the received signals for sensing and communication at the receiver, considering the limited computational resources of hardware and the strict timing constraint imposed by the varying channel conditions, it can be challenging to reach optimum solutions [1], [2] via conventional signal processing techniques. This high complexity is especially encountered in digital signal processing and optimization stages while generating the optimum waveform at the transmitter and processing the received signals for communications and sensing at the receivers.

The increased complexity of the ISAC design requires new approaches instead of the ones based on mathematical optimization or iterative techniques. Machine learning-based (ML-based) techniques, especially deep learning-based (DL-based) techniques, can be leveraged for ISAC systems to mitigate the complexity and address these challenges, enabling their seamless integration within future communication networks. Thus, DL-based techniques have recently been proposed to achieve near-optimum solutions for these challenges and issues in ISAC systems with limited hardware and energy resources.

Recent surveys have systematically reviewed the ISAC studies from different perspectives [3][9]. Liu et al. aimed to investigate the fundamental limits of ISAC techniques from a theoretical perspective [4], while Zhou et al. explored waveform design techniques and studies for ISAC [5]. Furthermore, the promising solutions and benefits that would be brought by ISAC and intelligent reflective surfaces (IRS) to 6G networks are surveyed in [6], [8], and enabling techniques, future applications, data sets, and future directions are reviewed in [7]. Finally, recent advancements and open challenges in ISAC systems are also explored and presented [9]. All of these surveys have focused on various aspects, problems, and solutions for ISAC systems. Moreover, a review article has focused on machine learning (ML) enhanced sensing and ISAC signal design [10], and an earlier study identified ten potential roles of ML in ISAC systems [11].

On the other hand, ML and deep learning (DL) have been extensively investigated to improve the performance of communication networks. Such studies focusing on ML, DL, reinforcement learning (RL), and distributed learning for future communication networks, including Internet of Things (IoT) systems, 6G networks, and vehicular networks, are also reviewed [12][17]. Especially DL and RL are promising techniques for physical layer problems [18], while distributed learning is seen as an essential approach for networking problems [19]. By integrating DL-based techniques, ISAC systems can become more intelligent, flexible, and efficient, paving the way for advanced applications in various domains, such as 6G networks or next-generation sensing networks. Table 35 presents the summary of the DL-based studies and categorizes them according to their applications and algorithms used.

Table 1: List of Surveys on ISAC Study and Design
Survey Topic
[3] 2021 Overview of signal processing techniques for ISAC systems.
[4] 2022 Fundamental limits of ISAC techniques from a theoretical
perspective.
[5] 2022 Waveform design techniques and studies for ISAC.
[7] 2022 Enabling techniques for ISAC, applications, tools
and data sets, standardization, and future directions
in ISAC research.
[6] 2023 ISAC techniques for 5GA and 6G networks
[8] 2023 ISAC systems powered by reflective intelligent surfaces.
[9] 2024 Recent advancements and open challenges in ISAC.
[10] 2024 Machine learning enhanced ISAC systems.
Table 2: Acronyms used in this article.
AI Artificial Intelligence
BER Bit Error Rate
BLER Block Error Rate
CNN Convolutions neural network
CRLB Cramer-Rao lower bound
CSI Channel state information
DFRC Dual-Functional Radar-Communication
NN Neural network
DNN Deep neural network
DL Deep learning
DRL Deep reinforcement learning
ELM Extreme learning machine
FIM Fisher information matrix
FCDNN Fully connected deep neural Network
FL Federated learning
FMCW Frequency-modulated continuous-wave
FNN Feed-forward neural network
GAN Generative adversarial network
RL Reinforcement learning
IM Index modulation
ISAC Integrated sensing and communications
IRS Intelligent reflective surface
IoT Internet of Things
KNN K-nearest neighbour
LSTM Long short-term memory
LMMSE Linear minimum mean-square error
MFOL Model-free online learning
MBOL Model-based online learning
ML Machine learning
MLP Multilayer perceptron
MSE Mean squared error
NMSE Normalized mean squared error
NOMA Non-orthogonal multiple access
OCDM Orthogonal chirp-division mult.
OFDM Orthogonal frequency-division mult.
OTFS Orthogonal time frequency space
QNN Quantum neural network
ReLU Rectified linear unit activation function
RMSE Root mean squared error
SER Symbol error rate
SLP Symbol-level precoder
SVM Support vector machine
SNN Spiking neural network
MUSIC Multiple signal classification
THz Terahertz
UE User equipment
MIMO Multiple-input multiple-output

Contributions↩︎

In contrast to the aforementioned surveys on ISAC systems, this article explores state-of-the-art advancements and research on DL-based techniques for ISAC systems and networks and presents a list of challenges, open research questions, and research opportunities. This study categorically and systematically reviews DL-based techniques developed for various modules of the ISAC systems, such as for beamforming, channel estimation, demodulation, and sensing processing. Afterward, it presents the advantages of DL-based techniques in terms of performance enhancements and computational complexity reduction in comparison with conventional methods. Moreover, it also highlights challenges encountered in DL-based ISAC techniques and possible future research directions in the intersection of DL-based techniques and ISAC systems for the development of future-generation sensing and communication networks.

The contributions of this study are summarized as follows:

  • This study categorically and systematically reviews the DL-based techniques developed for the ISAC system design and optimization, driven by a need to achieve real-time implementation, reduced system complexity, and improved performance and energy efficiency.

  • It also explores widely employed DL architectures, and their suitable applications for various modules of ISAC systems, and examines their computational complexities for training and inference, and dataset size requirements.

  • It identifies the challenges, open problems, and future research directions in DL-based techniques and their implementation for ISAC systems and networks.

The rest of this article is organized as follows. Section II describes the background of DL and provides examples of its applications in communication and sensing systems. Section III reviews the ISAC fundamentals and various architectural challenges, solutions, and performance metrics. Section IV presents the DL-based techniques for transmitter design and waveform optimization. Section V describes DL methods for channel estimation. Section VI presents DL-based techniques for communication and sensing receiver design. Section VII examines the computational complexity of DL-based techniques in comparison with conventional optimization-based techniques. Open research questions and potential future research directions are outlined in Section VIII. Finally, the conclusion of this article is drawn in Section IX. For convenience, all acronyms used in this article are given in Table 2.

Table 3: Overview of DL-based ISAC techniques.
Application Category Algorithms References Key features
Waveform Design and Optimization DNN, RL, LSTM, FCDNN [20], [21], [22], [23],[24], [[25]][26][27]
  • ISAC Waveform design and power allocation,

  • Waveform optimization for dynamic environmental conditions.

  • Optimum waveform for sensing and communications

  • Optimization of peak-to-average power ratio

  • Codebook design, signal modulation, power allocation, dynamic waveform design, energy-efficient algorithms, optimization

Predictive Beamforming DNN, CNN, LSTM, DRL, RL [28],[29],[30],[31],[32],[33],[34],[35]
  • Beamforming and precoder design for ISAC systems.

  • Predictive beamforming design

  • Interference management and exploitation

Channel Estimation FCDNN, CNN, ELM [36], [37], [38], [39]
  • Channel estimation for ISAC systems.

  • Angle of arrival estimation.

  • Channel tracking and prediction.

Communication Receiver FCDNN, SNN, LSTM, DNN Transformer [40], [41], [42], [43], [44]
  • Communication data demodulation.

  • Interference and self-interference cancellation and exploitation.

  • UWB impulse communication receiver

Sensing Receiver FCDNN, DNN, DNN Transformer, CNN, QNN, [40], [41], [43], [44],[45], [46], [47], [48]
  • Spectrum sensing for optimal resource allocation.

  • Target detection, target classification, and recognition.

  • Human gesture and motion recognition.

  • Target range, velocity, angle estimation

  • UE positioning

2 Deep Learning Background↩︎

DL techniques have been recently applied to many fields to optimize systems or solve complex problems that mathematical methods can not solve easily with limited computational resources and within a reasonably short time. DL models can be trained via various learning strategies such as supervised, unsupervised, or RL. A summary of learning strategies is illustrated in Fig 2 and briefly explained below in this section.

Figure 2: Learning strategies.

2.1 Supervised Learning↩︎

Supervised learning strategies utilize the labeled data sets during training and aim to create a model that maps the input data and the output data (labels) [49]. This mapping can be highly sophisticated and complicated for large-scale problems, such that it cannot be easily explained mathematically. Supervised learning techniques generate models from this training data, and these models are used to classify the unlabelled data or create solutions for the problem [50], [51]. Various ML models, including support vector machines (SVM), logistic regression, deep neural networks (DNN), k-nearest neighbors (KNN), random forests, decision trees, boosted trees, can be trained via supervised learning [52], [53].

This learning type requires a large amount of labeled data for training. It strives to learn the relationship between the input and output data depending on the learning parameters during training. For instance, the mean squared error (MSE) can be used to construct the loss function for supervised learning, as given by \[\mathcal{L}_{s}(x,y,\theta_s) = \frac{1}{N}\sum _{(x_n,y_n)\in \mathbf{X}_{L}} (y_n - \hat{y}_n)^2,\] where \(x_n\) and \(y_n\) denote input and labeled data in the data set \(\mathbf{X}_L\) consisting of N training samples, while \(\theta_s\) and \(\hat{y}_n\) denote the learning parameters and predicted output during the \(n\)th training instances, respectively. The loss function of supervised learning can also be defined based on various other metrics, such as cross-entropy, softmax loss function, and MSE, among other possible metrics [54].

Requiring a large labeled dataset is the main disadvantage of this learning strategy, since obtaining a sufficiently large labeled dataset for most applications may not be possible. As a solution for the limited amount of available labeled data, various data augmentation methods are employed to increase the amount of labeled data by generating synthetic data in addition to the ground-truth data, especially for natural language processing and image processing applications [55], [56].

2.2 Unsupervised Learning↩︎

Unsupervised learning explores the similarities in finding patterns in the dataset without requiring labeled data. This learning strategy is particularly effective for exploring relationships within the data, discovering underlying patterns, and solving optimization problems[57], [58].

More interestingly, especially for communications and sensing systems, unsupervised learning can be performed to solve an optimization problem, where the loss function for training is defined by combining the objective function and constraints[58][61]. An exemplary loss function for unsupervised DL is given by \[\mathcal{L}_{u}(x,\theta_u) = -\sum_{k=1}^K \log_2 \left(1+\frac{f_k(x_n, \theta_u)}{f_i(x_n, \theta_u)+\sigma_n^2}\right),\] which aims to maximize the sum rate, i.e., minimizing the negative of the sum rate, where \(\theta_u\) denotes the learning parameters of the unsupervised learning. Functions \(f_k(.)\) and \(f_i(.)\) compute the useful signal power and interference power on the \(k\)th user equipment (UE), while \(\sigma_n^2\) denotes the variance of the Additive white Gaussian noise at the \(k\)th UE. Moreover, it is also possible to consider other performance metrics, such as energy efficiency or probability of detection for sensing in the loss function of the unsupervised learning.

An unsupervised learning approach has been applied to resource allocation problems in wireless communication systems [62] or beamformer and precoder design problems6 in ISAC systems [61]. For ISAC, key performance parameters for sensing and communication can be incorporated into the loss function of unsupervised learning.

2.3 Semi-supervised Learning↩︎

Another approach in DL training is semi-supervised learning, where unlabeled data instances are utilized during learning in addition to the labeled data instances. Especially in the case of not having a sufficient amount of labeled data, semi-supervised learning can achieve significantly higher accuracy compared to supervised learning [63]. For instance, a semi-supervised learning-based radar data processing method outperforms the fully supervised learning-based method in object detection by up to 36%, where the amount of labeled radar data is limited since labeling radar data is a difficult task [64]. Another study proposes a semi-supervised learning-based target parameter estimation method for ISAC systems, which can achieve similar performance with the supervised learning-based method by utilizing 98.8% less labeled data[65]. One of the approaches for semi-supervised learning is forming the loss function as a combination of the objective functions of supervised learning and unsupervised learning, which will yield a semi-supervised learning model as [66],

\[\mathcal{L} = \underset{\text{supervised loss}}{\underbrace{\alpha\sum _{(x,y)\in X_{L}}\mathcal{L}_{s}(x,y,\boldsymbol{\theta}_s)}}+\beta \underset{\text{unsupervised loss}}{\underbrace{\sum _{x\in X_{U}}\mathcal{L}_{u}(x,\boldsymbol{\theta}_u)}},\] where hyperparameters \(\alpha\in\mathbb{R}_{>0}\) and \(\beta \in\mathbb{R}_{>0}\) are the weights of loss functions (\(\mathcal{L}_s\) and \(\mathcal{L}_u\)) of supervised and unsupervised training, respectively. The hyperparameters \(\alpha\) and \(\beta\) are generally fine-tuned during training, such that the importance of the unsupervised learning is gradually increased during training [67][69]. Moreover, \(x\) and \(y\) denote the input data and labeled data while \(\boldsymbol{\theta}_s\) and \(\boldsymbol{\theta}_u\) denote the learning parameters of supervised learning and unsupervised learning, respectively.

2.4 Reinforcement Learning↩︎

RL is based on trial and error, where an agent strives to learn how to perform a task within an action space. The agent performs actions in the action space and observes the result of the actions and rewards to decide the subsequent actions. The main objective of the agent is to maximize the reward during the learning process. In this way, the agent can learn the tasks in a defined action space without having any labeled data [70], [71]. The main advantage of RL is that it does not require any labeled dataset. However, the learning process may require a large number of computationally intensive simulations since it employs a try-and-error approach to learning and requires a simulation environment.

The objective of the RL problems is to choose actions within the action space at each training instance to maximize the rewards. For instance, the total reward received over \(T\) time steps can be defined as the performance metric given by [72], \[\begin{align} J_T(i_0) & = \mathbb{E}\left[\sum_{t=0}^T \alpha_d^t R(x_t)|_{x_0=i_0} \right] \\ & = \mathbb{E}\left[i_0 + \alpha_d R(x_1) + \alpha_d^2 R(x_2), \cdots, \alpha_d^N R(x_N) \right] \notag, \end{align}\] where \(i_0\), \(R(.)\), and \(0\leq \alpha_d <\leq 1\) denote the start state, reward function, and discount factor, respectively. When \(\alpha_d\) is close to one, RL will pursue long-term rewards, while having a value closer to small will force it to strive for short-term rewards.

While RL can handle numerous tasks, it suffers from high-dimensional data sets, such as real-time images, video processing, or fusion of multiple sensor data. Accordingly, deep RL (DRL) was proposed to handle high-dimensional data sets by leveraging DL with RL[73]. DRL can effectively operate with real-time communication data, radar data, or visual data to learn sophisticated tasks, as encountered in communication networks [74], autonomous driving [75], and real-time control [71].

2.5 Transfer Learning↩︎

Transfer learning pursues the reuse of the trained ML models for new problems, and it is one of the most powerful learning strategies considered for 6G and beyond networks [76] since it can substantially reduce the training time. It can utilize a DL model previously trained on a specific problem to solve a new problem that is unseen by the model. The transfer learning approach has been used to reduce the amount of training data required for neural networks, optimize latency and energy efficiency, accelerate RL for communication network slicing, and design precoders for ISAC networks [26], [77][80].

2.6 Distributed Learning↩︎

Training large DL models requires a large amount of data and computational power, exponentially increasing in relation to the number of parameters involved in the model. Furthermore, tuning the model’s hyperparameters to devise the optimum DL model for a specific task may require re-training the model multiple times. Accordingly, numerous computational resources may need to be concurrently utilized to train comprehensive DL models, leading to a distributed computation network rather than a centralized system [81].

Distributed learning may be performed by numerous strategies such as data parallelism, model parallelism, compute prioritization, and asynchronous parallel execution [82]. However, sharing all the data or the entire model among all computation nodes may cause privacy concerns and a tremendous amount of communication overhead. Thus, federated learning (FL) is devised as an efficient learning approach to overcome these problems. In FL, multiple nodes collaboratively train DL models without sharing the raw data, hence substantially reducing communication overheads among the nodes and also eliminating privacy concerns. Each node trains its own model with its own local data while only sharing the necessary parameters with an aggregation center and keeping its own raw data locally [83]. Owing to its advantages, FL has already been applied to edge computing, IoT systems, vehicular communications, and ISAC systems [48], [84].

2.7 Deep Learning Architectures↩︎

Figure 3: DL architectures.

DL models consist of many layers of artificial neural networks, and these layers are trained through large amounts of data during a learning procedure [49]. More extensive neural networks can attain higher accuracy on more complex and sophisticated tasks that also require massive amounts of data for learning [85]. Moreover, recent advances in CPUs, GPUs, and distributed computing have enabled training more extensive neural network (NN) models with vast amounts of data[86]. Fig. 3 presents the widely used DL architectures, and a brief review of them is presented below7.

The advanced algorithms and techniques proposed in the literature for communication systems can have a very high complexity or hardware complexity to be implemented in real-time systems. However, DL can solve this complexity issue by utilizing a data-driven [87] or model-based approaches [88]. The main computational burden of DL-based techniques is encountered during training, especially in data-driven approaches, since training large-scale DL models requires a large amount of data, and computational and memory resources. However, the training is usually performed offline on GPUs or distributed computing architectures [89], hence, the computational complexity involved in training deep learning models does not impact their deployment. Accordingly, the trained DL models can be implemented even on low-power edge devices since the computational complexity of inference of DL models is significantly lower compared to iterative or optimization-based methods [90]. Moreover, task-specific fine-tuning of the DL models can be performed based on the pre-trained models via federated edge learning without introducing a significant computational burden [91].

The application of DL has recently grown in wireless communication systems due to its advantages over conventional signal processing techniques [92]. It is expected to be a vital part of 6G wireless networks [93]. DL-based techniques can also interpret and solve high-complexity problems encountered while designing ISAC systems, such as optimum waveform design, channel estimation, interference cancellation, or receiver processing.

2.7.1 Feedforward Neural Networks↩︎

Feed-forward neural networks (FNN) (also called multilayer perceptron (MLP) or fully connected deep neural networks (FCDNN)) consist of multiple layers of fully connected neurons. These models generally use linear or nonlinear activation functions to learn sophisticated patterns in the data. Each neuron in a layer is connected with activation functions to all neurons from the previous layer, and the last layer is connected to the output [86]. FNN can be combined with other DL architectures given below to achieve a better learning performance, computational efficiency, or prediction accuracy, thus they are widely employed in communication and ISAC systems [44], [94].

2.7.2 Convolutional Neural Networks↩︎

Convolutional neural networks (CNN) consist of convolutional layers, which are utilized to learn specific features and patterns in the data. CNN is a powerful technique, especially for image processing. Accordingly, many modern DL-based image processing models include numerous convolutional layers in addition to fully connected ones. CNN can be utilized in ISAC systems, especially for channel estimation, since it can accurately learn and classify specific and dominant features of the channel and may outperform fully connected layers [95]. Moreover, CNNs are widely used in target detection, parameter estimation, and target recognition and classification in radar systems [96]. Hence, it can also be utilized in ISAC systems to process radar images.

2.7.3 Recurrent Neural Networks↩︎

Recurrent neural networks (RNNs) are DL-based algorithms that strive to learn and utilize the relation between sequential data for temporal problems. RNNs take into account previous input instances in addition to the current input [97], [98]. In RNNs, the hidden layers are composed of recurrent cells of which states are impacted by both past conditions and present information via feedback links [99]. Long short-term memory (LSTM) is a class of RNNs that is developed by enhancing the standard recurrent cells with the introduction of input, output, and forget gates. Accordingly, an LSTM cell can determine which information will be discarded (forgotten) from the cell state, resulting in an improved learning performance [99]. RNN and LSTM can efficiently learn datasets that have a correlation or relation within sequential data instances. For instance, channel estimation can be performed by RNN or LSTM since sequential channel instances are correlated in many wireless communication scenarios [100][102]. Moreover, LSTM is also considered for predictive beamforming design, where the beamforming matrix for the next time slot is predicted based on the historical channel data [34], [103].

2.7.4 Autoencoder↩︎

An autoencoder (AE) is a specific type of artificial neural network that encodes and decodes unlabeled data efficiently via unsupervised learning. It comprises two main elements: an encoder, which transforms the input data into a compressed representation, and a decoder, which strives to reconstruct the input from this compressed representation [104]. This mechanism facilitates the autoencoder in discovering an efficient encoding method for a dataset that can be utilized to solve various problems. Autoencoders have already been considered to mitigate various conditions such as carrier frequency and phase offset or multi-path fading in wireless networks [105], [106].

2.7.5 Generative Adversarial Network↩︎

Generative Adversarial Network (GAN) is a generative modeling approach based on DL architectures such as CNN or MLP. GAN models aim to recognize patterns in the input dataset to generate new samples similar to the genuine data. GAN generally has two trainable and differentiable modules: a generator and a discriminator. The initial input of the generator is typically random noise. The training is based on game theory, such that the generator and discriminator iterate to optimize their performance. The discriminator strives to differentiate fake and real signals accurately, while the generator strives to generate fake signals increasingly resembling the real signals with each training iteration [107]. GAN-based techniques have been proposed for channel estimation, signal classification, data receiver, and signal denoising in wireless communication systems [107][109].

2.7.6 Self-organizing map↩︎

The self-organizing map (SOM) is an artificial neural network architecture based on unsupervised learning, which maps high-dimensional input data to a low-dimensional representation [110]. SOM is a bioinspired ML model motivated by retina-cortex mapping with a low computational complexity. Self-organization can be used for pattern recognition, clustering, classification, data visualization, and mining[111]. Some applications of SOM in wireless communication networks are anomaly detection in wireless networks [112], efficient path planning for UAV-IoT systems [113], or localization in wireless sensor networks [114].

Table 4: No caption
Architecture Characteristics Example applications for ISAC
MLP Fully connected layers General-purpose method Waveform design and optimization [21] Beamformer/precoder optimization [24], [27] Data modulation and demodulation [40]
CNN Utilizes convolutional layers Captures features and patterns in data Channel estimation[37], [38] Target parameter estimation [47], [65] Gesture and motion recognition[48]
LSTM-RNN Remembers previous instances Effective for time-series and sequential data Predictive beamforming [34], [103] Data demodulation[42] Target tracking [115]
RL Learns optimal decisions by exploration Leverage feedback to dynamically optimize Resource allocation and optimization [116], [117] UAV trajectory planning for ISAC [118]
Transformers More sophisticated architectures Utilizes self-attention and relations in data Resource intensive and needs larger datasets Joint data and target parameter estimation [43] Predictive beamforming [31], [119]

2.7.7 Model-based Deep Learning↩︎

Model-based DL methods utilize both explicit expert knowledge of the system and a DL approach to yield solutions to particular problems [88]. Utilizing even an approximate mathematical model of the problem in combination with DL can significantly reduce the amount of data required compared to data-driven DL models. [120]. Furthermore, model-based DL approaches also enable the DL-based solutions to be better understood and predictable compared to data-driven black-box models. Model-based DL integrates detailed models of the system or algorithms into the learning process. Unlike black-box DL approaches that learn to make predictions directly from data, model-based DL approaches endeavor to understand the underlying mechanisms of the model or algorithm [88]. One specific example of model-based DL is deep unfolding, which incorporates both DL and traditional iterative algorithms employed in signal processing or wireless communications. Deep unfolding aims to leverage the well-known structures of algorithms through learnable parameters in DL models [121]. Employing model-based DL architectures, the computational complexity of iterative techniques can be reduced to facilitate their implementation in real-time systems.

Table [tab:models] presents widely used DL architectures, their features, and suitable applications of them in ISAC systems. It is possible to utilize various DL architectures to develop a wide range of methods for ISAC systems. For instance, DNN and CNN architectures can be used for channel estimation. On the other hand, LSTM or transformers can be used for predictive beamforming since they capture temporal correlations and relations between the channel instances. However, the choice of the DL architecture will affect the performance and resource usage. This section briefly reviews DL architectures that can be applied in wireless communication and ISAC systems. More details regarding DL architectures and their applications can be found in [49], [86], [93], [122][125].

Figure 4: A communication-centric ISAC system architecture.

3 ISAC Fundamentals↩︎

ISAC is one of the primary techniques that is expected to be at the core of 6G and beyond systems. Various applications can employ ISAC to improve the service quality, energy efficiency, or performance while reducing the power consumption [9], [126], [127]. For instance, autonomous and intelligent vehicles can communicate with each other while sensing their environment to enable safe and reliable self-driving [28], [128]. This section briefly presents the fundamentals of ISAC systems with widely used performance metrics.

3.1 Collocated Communication and Radar Systems↩︎

Radar and communication systems can interfere with each other if they are closely located and operate in overlapping frequencies. The interference between communication and sensing systems significantly affects both systems and, hence, needs to be managed and coordinated to achieve the best performance of both systems. To alleviate this performance degradation, radar and communication systems need to share data such as channel state information (CSI), transmission time or frequency bands, and transmitted data to achieve coordination between them. Coordination and cooperation between these two systems are not easy tasks since they require a massive amount of data sharing and strict policies. Consequently, a dual-function system, i.e., an ISAC system, can be developed on the same hardware platform to provide both sensing and communication functions. A wide range of techniques can be utilized to devise ISAC systems that provide both sensing and communication functions that employ the same hardware and signals. These techniques are generally considered under three major categories, as explained below.

3.2 Communication-centric ISAC Design↩︎

Communication waveforms can be utilized for radar sensing, with causing a minimal impact on communication performance via various techniques. These techniques modify communication waveforms to facilitate sensing within them. Hence, the primary function of the modified waveforms is to deliver data transmission while performing sensing as a secondary function. For instance, sidelobes of the communication signals can be constructed toward possible targets, while main beams are formed for communication UEs. Due to being based on existing communication waveforms, these techniques are prominent candidates for 6G and beyond wireless communication networks to enable sensing within the communication network [129][134]. As an example, a communication-centric ISAC system architecture is shown in Fig. 4, where orthogonal frequency division multiplexing (OFDM) and orthogonal time frequency space (OTFS) waveforms can be utilized for communication, and the beamforming is performed by also considering possible target directions in addition to communication UEs. OFDM and OTFS are considered attractive waveforms for 6G and beyond networks [135][138].

3.3 Radar-centric ISAC Design↩︎

It is also feasible to enable data transmission in sensing systems to communicate with UEs. Radar-centric ISAC techniques aim to enable communications using sensing waveforms without significantly changing the radar hardware and system complexity. In a radar-centric ISAC approach, sensing tasks are the primary concern, whereas communication is considered as a secondary function. A radar-centric ISAC system architecture is illustrated in Fig. 5, where the radar waveform is modified to carry data to the end UEs. For instance, FMCW chirps can be modified using index modulation (IM) to enable data transmission within a short-range radar [139], [140]. Moreover, other radar waveforms can also be used to transmit data, such as linear frequency modulated (LFM) signals, which can be modulated via minimum-shift keying (MSK) or phase-shift keying (PSK) to carry data [141], [142]. Enabling sensing within radar waveforms might affect the sensing functions; nevertheless, this can be alleviated by advanced signal processing methods or the implementation of DL techniques.

Figure 5: A radar-centric ISAC system architecture.

3.4 Dual-Function Waveform Design and Optimization↩︎

In the communication-centric or radar-centric design of ISAC systems, one function is determined as the primary function, while the other is an auxiliary function. Consequently, those approaches can be used to improve the existing systems without significantly changing their architecture. However, the ultimate goal for ISAC systems is to have dual-functional waveforms that can provide target detection while carrying information at the same time. Such an approach can provide both functions equally without having a bias towards either of them. Moreover, the trade-off between communication capacity and sensing accuracy can be dynamically adjusted depending on instantaneous communication and sensing requirements. An approach based on a novel dual-functional ISAC waveform design is illustrated in Fig. 6, where the waveform transmitted is continuously optimized by considering immediate sensing and communication requirements. Dual-functional ISAC waveforms can be designed to yield a minimized multi-user interference or constant transmit power per antenna, or total transmit power. This ISAC waveform optimization problem can then be formulated as [143], \[\begin{align} &\min _{\mathbf{X}} \quad\quad\|\mathbf{H X}-\mathbf{S}\|_{F}^{2} \\ &\text{ s.t. } \quad\quad\left\|\mathbf{X}-\mathbf{X}_{0}\right\|^2_{F} \leq \eta, \\ & \quad\quad \quad\quad\left|x_{i, j}\right|=\sqrt{\frac{P_{T}}{N}}, \forall i, j, \\ \end{align} \label{eq:wave95sim}\tag{1}\] where \(\mathbf{X} \in \mathbb{C} ^{N\times L}\), \(\mathbf{S} \in \mathbb{C} ^{N\times L}\) and \(\mathbf{X} _{0} \in \mathbb{C} ^{N\times L}\) denote the transmitted ISAC signal matrix, desired symbol matrix for communications and optimum radar signal matrix for sensing, respectively, where \(N\) and \(L\) denote the number of transmit antennas and number of symbols. Matrix \(\mathbf{H} \in \mathbb{C} ^{K\times N}\) denote the CSI matrix between the \(K\) UEs and \(N\) transmit antennas. The waveform design problem given by 1 strives to minimize the multi-user interference, \(\left\|\mathbf{HX-S}\right\|_F^2\), while ensuring that the per-antenna power constraint is satisfied and that the difference between the transmitted matrix and the optimum radar waveform, \(\left\|\mathbf{X}-\mathbf{X}_{0}\right\|^2_{F}\), is below a certain threshold, denoted by \(\eta\), satisfying a minimum sensing performance. Parameter \(0\leq\eta\) defines a threshold for the difference between the optimum radar waveform \(\mathbf{X}_0\) and the optimized ISAC waveform, such that a lower value of \(\eta\) enforces a higher similarity. For this optimization, the optimum radar signal matrix \(\mathbf{X}_0\) need to be computed in advance.

Figure 6: Design and optimization of dual-functional waveforms in an ISAC system.

It is also possible to devise ISAC waveforms without having any reference waveforms for sensing and communications. Such waveforms can equally provide sensing and communication performance, or a trade-off parameter between communication and sensing performances can be included in the waveform design to dynamically adjust the balance between their sensing accuracy and communication, depending on the situation or instantaneous sensing and communication requirements. For instance, design of an ISAC MIMO precoder, \(\mathbf{W}\), can also be formulated as follows [27], \[\begin{align} &\max _{\mathbf{W}} \quad\quad\rho\beta \sum_{k=1}^K {C_k\left(\mathbf{W}\right)} + \frac{(1-\rho)\gamma}{\sum_{t=1}^{T}{\psi_t\left(\mathbf{W}\right)}} \\ &\text{ s.t. } \quad\quad||\mathbf{W}||_F^2 \leq P_t, \end{align} \label{DualFunctionWaveform}\tag{2}\] where \(\rho\) is the weighting parameter to adjust the trade-off between communication capacity and sensing accuracy. Moreover, \({C_k\left(\mathbf{W}\right)}\) denotes the channel capacity of the \(k\)th UE, \({\psi_t\left(\mathbf{W}\right)}\) denotes the Cramer-Rao lower bound (CRLB) of the waveform for the \(t\)th target, and both these performance metrics are the functions of the precoder matrix, \(\mathbf{W}\). Parameters \(\beta\) and \(\gamma\) are used to normalize the sum capacity and sum CRB values, and \(P_t\) denotes the total transmit power budget.

The optimization problem (1 ) aims to design the ISAC waveform by shaping the transmit waveform between the optimum communication and optimum sensing waveforms. However, it does not guarantee the desired sensing and communication since it does not take into account the performance metrics. Moreover, it requires knowledge of the optimum waveforms. Hence, this problem can be solved by a supervised learning approach. On the other hand, the optimization problem (2 ) aims to design a novel waveform that can satisfy both sensing and communication performance metrics. Moreover, the latter method does not require knowledge of the optimum waveforms; hence, it can be optimized via an unsupervised learning approach.

3.5 Performance Metrics for ISAC↩︎

The sensing capability of a radar and the sum rate of a communication system are bounded by waveform parameters, which are functions of waveform characteristics such as bandwidth, signal-to-interference-plus-noise ratio (SINR), and other signal features. Radar range and velocity estimation accuracies of a radar signal are predominantly determined by its ambiguity function, which is a widely used performance metric for sensing. Let \(u\left(t\right)\) define a signal that is used for sensing; its ambiguity function (AF) is then given by [144] \[\Omega\left(\tau,\omega\right)=\int_{-\infty}^{+\infty}u\left(t\right)u^{*}\left(t-\tau\right)e^{-j2\pi\omega t}dt,\] where \(\tau\) and \(\omega\) denote delay and Doppler frequency caused by the sensing of targets, respectively.

Another widely used sensing performance metric is CRLB, which is calculated for target parameter estimation, e.g., range, velocity, angle, localization, in radar systems [145], [146]. The generalized equation for CRLB for the estimation of a deterministic parameter is given by [4] \[\text{CRLB}_{\boldsymbol{\theta}}=\mathbf{J}^{-1}(\boldsymbol{\theta}),\] where \(\mathbf{J}(\boldsymbol{\theta})\) denotes the Fisher information matrix (FIM) and its (\(i\),\(j\))-th element is given by \[[\mathbf{J}(\boldsymbol{\theta})]_{i,j}=\mathbb{E}\left[\frac{\partial \ln p(\boldsymbol{y}; \boldsymbol{\theta})}{\partial \theta_{i}} \frac{\partial \ln p(\boldsymbol{y}; \boldsymbol{\theta})}{\partial \theta_{j}}\right],\] where \(p(\boldsymbol{y}; \boldsymbol{\theta})\) is the likelihood function associated with estimating the parameter vector \(\boldsymbol{\theta}\) from the measurements \(\boldsymbol{y}\). Moreover, the probability of detection and false alarm rate are also widely used as sensing performance metrics.

Figure 7: DL-based ISAC transmitter architecture.

On the other hand, performance metrics widely used for communication systems are bit error rate (BER), block error rate (BLER), symbol error rate (SER), sum rate, and energy efficiency. For instance, the sum rate of a network consisting of \(K\) communication UEs is given by \[R_K = \sum_{k=1}^K \log_2\left(1 + \frac{p_k}{i_k + n_k} \right),\] where \(p_k\), \(i_k\), and \(n_k\) denote the received useful signal power, interfering signal power, and noise power at the \(k\)th UE. The ISAC systems aim to maximize both communication and sensing performance metrics regarding a desired trade-off between them within the system limitations.

4 DL-based Techniques for ISAC Transmitters↩︎

Table 5: DL-based techniques for ISAC transmitters.
Ref. Learning Strategy Algorithm Inputs Outputs Pros Notes
[20] Model-based Online RL MLP with ReLU CSI, power budget PA, SCS, optimized ISAC waveform
  • Effective under interference

  • Data-efficient

  • Model-based approach

  • Requires specific assumptions

  • Data-driven method may perform better with a large amount of data

[21] Model-free Online RL MLP with ReLU CSI, power budget PA, SCS, optimized ISAC waveform
  • Outperforms model-based method with a large number of training samples.
  • Data-driven method

  • Slower convergence

[22] Unsupervised Learning MLP with ReLU & LSTM Comm data, CSI, Target angles SLP ISAC beamformer, comm data, target detection
  • End-to-End Learning for the entire ISAC system

  • Joint waveform design

  • Satisfactory performance

  • Low-complexity SLP

  • MLP for transmitter, receiver, and target detector

  • LSTM for target angle estimation

[23] RL FCDNN Waveform parameters OCDM waveform
  • Enhanced target detection

  • Enhanced symbol decoding

  • Joint waveform design, target detector, and comm decoder

  • Data-driven method

  • Supervised learning for the receiver

[24] Supervised End-to-end Learning Autoencoders (FCDNN) Communication data, possible locations of targets and CSI ISAC beamformer
  • Robust to hardware impairments

  • Similar performance to the benchmark

  • Data-hungry

  • End-to-end training

  • Data-driven method

  • Long training duration

[25] RL DRL (FCDNN) Estimated ranges, angles, and velocities of targets Beamforming weights and antenna selection
  • Achieves the desired beam pattern

  • Outperforms the benchmark

  • DRL-based method

  • ISAC for automotive

  • High computational complexity

[26] Unsupervised & Transfer Learning FCDNN CSI Beamforming matrix
  • Transfer learning is used to reduce training time

  • Outperforms supervised learning

  • Transfer learning

  • Distributed interference management

[27] Unsupervised Learning FCDNN CSI, target angles, and trade-off parameter Precoding matrix
  • Adjustable trade-off with multiple DNNs

  • Low complexity via weight quantization and pruning

  • Outperforms WMMSE

  • Low memory usage

  • Trade-off design

Signal design is essential to developing ISAC systems since the signals need to be carefully designed to deliver both sensing and communication functions. DL-based techniques can significantly reduce the computational complexity of ISAC signal design. The ISAC transmitter mainly deals with modulating the communication data, generating and optimizing the ISAC waveform, and designing beamforming or precoding in MIMO systems. DL methods can be primarily utilized for digital signal processing in ISAC transmitters, as shown in Fig. 7 to replace the computationally intensive iterative or optimization-based signal processing techniques. For instance, waveform design and optimization for sensing and communication, as well as precoder design and data modulation, can be performed by DL-based techniques since they can efficiently solve complex and computationally intensive optimization problems [147], [148].

Table 5 presents an overview of DL methods that have been developed for transmitters. This table shows that DL-based techniques are mainly used for ISAC waveform design and optimization, predictive beamforming, symbol-level precoding, power, and subcarrier allocation. These methods are especially proposed for communication-centric or dual-function ISAC systems.

Figure 8: ISAC waveforms design via DL.

4.1 Waveform Design and Optimization↩︎

Fig. 8 illustrates an approach to design and optimize ISAC waveforms based on DL techniques, where the training can be performed via supervised learning, unsupervised learning, or RL strategies. Moreover, model-free or model-based DL architecture may be employed in the design. Waveform design chiefly requires the optimization of waveform parameters or resource allocation to achieve the best performance for sensing and communications.

Model-based and model-free online RL are considered to optimize power and subcarrier allocation in [20], [21]. The model-based method exploits the expert knowledge of the ISAC system. Hence, it requires fewer training samples and provides a highly effective solution under various interference scenarios for ISAC waveform design and optimization [20]. On the other hand, the model-free method requires many more training samples as it is a data-driven method [21]. It was shown that the model-based method converges much faster than the model-free method; however, the model-free method may outperform the model-based method when a large number of training samples are available. In these studies [20], [21], RL with a single hidden layer FNN is used. Moreover, these methods eliminate the need to solve non-convex optimization problems while achieving near-optimum waveform optimization. Another study proposed a similar approach (RL with FCDNN architecture) to design an orthogonal chirp-division multiplexing (OCDM) ISAC waveform in a data-driven manner [23]. This study modeled the entire system, including the transmitter, communication receiver, and radar receiver, as a neural network, hence utilizing an end-to-end approach to train the RL model.

4.2 Beamformer and Precoder Design for ISAC↩︎

Designing an optimum beamformer or precoder can be challenging due to requiring non-convex optimization or iterative methods, even for communication systems. For instance, DL-based techniques have already been studied for designing the weighted minimum mean-square error (WMMSE) beamformer for only communication systems to reduce its computational complexity [149], [150]. Beamformer design for ISAC systems is much more complex due to involving a larger parameter space, including the parameters related to sensing (e.g., CRLB, probability of detection, radar SNR). Accordingly, DL-based techniques may be efficiently utilized to reduce this complexity. Designing a symbol-level precoder (SLP) for ISAC using MLP and LSTM is proposed in [22], where an end-to-end data-driven unsupervised learning approach is implemented. This study utilizes an MLP network for SLP design, while it utilizes an LSTM model for target angle estimation. Their simulation results revealed that the method proposed in [22] achieves a satisfactory performance while significantly reducing the computational complexity caused by the SLP design for ISAC.

Another study in [24] proposes an autoencoder-based method with supervised learning for ISAC beamforming design, which presented a performance similar to the computationally expensive iterative method, with a robust performance under hardware impairments. However, due to being a data-driven supervised learning method, this method requires a large number of training samples (e.g., \(2\times10^7\)).Moreover, beamforming for automotive ISAC systems is explored in [25], where a DRL approach is adopted to select the antennas and beamforming weights. Their method was shown to outperform the relaxed optimization problem solution. However, the computational complexity of DRL for real-time operations on automotive radar hardware remains a challenge, requiring further studies. As can be seen from the studies reviewed above, supervised learning, unsupervised learning, and RL approaches can be used for ISAC waveform and beamformer design. Transfer learning is also utilized for ISAC beamforming design, where a pre-trained model is utilized for distributed interference management and beamforming, reducing the training time [26]. Moreover, this enables each BS to utilize the local CSI for training in a network. A recent study has proposed an ISAC precoding method based on unsupervised learning, which optimizes the precoding matrix to maximize the sum rate and minimize CRLB on target angle estimation for a given trade-off between the communication and sensing [27]. It utilizes multiple FCDNNs to adjust the trade-off instantaneously. Hence, it achieves a higher sum rate than the WMMSE precoder when the trade-off parameter is adjusted to maximize the communication performance. Furthermore, it also reduces the complexity and memory usage of the DNN via weight pruning and quantization.

Table 6: DL-based ISAC predictive beamforming techniques.
Ref. Learning Strategy Algorithm Inputs Outputs Pros Notes
[28] Unsupervised Learning CNN & LSTM Historically estimated CSI Predictive beamforming matrix
  • Predicts the beamforming matrix of the next time slot

  • Achieves a satisfactory sum rate

  • Does not require explicit channel tracking

  • Data-driven method

  • Applicable to vehicular networks

[29] [30] Supervised Learning CNN & LSTM Historical estimated angles Estimated beamforming angle
  • Comparable performance to perfect beamforming with real-time angles

  • Spatial and temporal features of the channel

  • Vehicular communication scenarios

  • CNN and LSTM are utilized to exploit both temporal and spatial features.
[31] Unsupervised Learning Transformer (Encoder: CNN Decoder: CNN) Previous beamforming matrix and previous vector of signal echoes Beamforming matrix for next time slot
  • Higher sum rate than state-of-the-art beamforming methods

  • Reduced signaling overhead

  • Transformer-based beamforming scheme

  • A trade-off observed between communication and sensing performance.
[32] Supervised Learning CNN & LSTM Vector of echo signals Estimated angle
  • Angular tracking based on the echo signals

  • Higher sensing performance compared to other CNN and LSTM models

  • Target angle tracking and beam prediction are performed.
[33] Supervised Learning Residual neural network (ResNet) & FCDNN & YOLOv5 CSI and images Weighted Multi-model Feature
  • Solid angle prediction accuracy, achievable rate, and outage performance

  • Strong robustness against vehicle drifting and environmental interference

  • Multi-modal environment information is fused and used.
[34] Unsupervised Learning CNN & LSTM Historical CSI Beamforming matrix
  • Satisfactory performance in terms of both communication and sensing tasks

  • Adjustable trade-off between sensing and communication performance.

  • ISAC beamforming for vehicles exhibiting complex behaviors.
[35] Supervised Learning FCDNN Received signal samples Beamforming angle
  • Better communication performance than the factor graph approach

  • Low latency and high accuracy beam tracking

  • Maintains reliable communications in high-mobility vehicular networks

4.3 Predictive Beamforming↩︎

Predictive beamforming is a recent approach that leverages the knowledge of the historical channel data to reduce the dependency on instantaneous CSI and signaling overheads, improve the angle estimation accuracy, or target tracking in millimeter-wave systems [151]. Predictive beamforming aims to estimate the beamforming vector of the next time slots based on historical channel data or sensing information. Table 6 compares the DL-based predictive beamforming studies, where supervised learning or unsupervised learning is used to train the models.

A combination of CNN and LSTM algorithms is generally used for predictive beamforming [28][30], [32], [34]. While CNN learns the patterns in the historically estimated CSI, the LSTM network exploits the correlation between the CSI of sequential time slots to predict the beamforming matrix in the next time slot. This method is proposed especially for vehicular networks, and it is a data-driven approach trained via unsupervised learning.

For instance, Fig. 9 shows that the HCL-Net predictive beamforming method, which employs both LSTM and CNN, outperforms LSTM-based, FCDNN-based, and CNN-based methods in terms of sum rate and can reach the upper bound since it can exploit both spatial and temporal features of the communication channels for beamforming [28].On the other hand, residual neural network (ResNet), and transformer-based methods are also proposed for predictive beamforming [31], [33], [35].In addition to historical channel data, some studies also utilized camera images of the scenario or reflect signal echoes to improve the beamforming performance [31][33].

Figure 9: Comparison of DL-based predictive beamforming methods [28].

Vehicular networks can particularly benefit from DL-based predictive beamforming since obtaining the instantaneous channel data is challenging in such scenarios due to the high velocity of vehicles. Predictive beamforming methods can perform satisfactorily even in complex vehicular network scenarios since they may fuse sensing data, camera images, and historical channel data to achieve a high-accuracy beamforming performance [31], [33]. Predictive beamforming reduces the communication overheads and eliminates the need for instantaneous CSI. Thus, it is one of the major application areas of DL-based techniques in ISAC transmitters.

Table 7: List of DL-based CSI estimation techniques for ISAC systems.
Ref. Learning Strategy Algorithm Inputs Outputs Pros Notes
[[36]][37] Supervised Learning FCDNN & CNN The received communication and sensing signals, LS estimation of channels The communication and sensing channels
  • Estimates direct SAC channel, reflected communication channel, and reflected sensing channel

  • Better NMSE performance compared to the LS estimator

  • Reasonable complexity

  • There-stage DNN-based estimator for direct SAC channel, IRS reflected communication channel, and IRS reflected sensing channel

  • Decent generalization capacity for various SNRs

  • Data-driven method

[38] Supervised Learning FCDNN & CNN Received pilot signals The communication and sensing channels
  • Outperforms traditional estimators for OTFS communication.

  • Provides a better sensing performance in terms of false alarm probability.

  • Utilizes denoising and feature elimination modules

  • Data-driven method

  • Requires a large number of training samples

[39] Supervised Learning ELM The received Sensing and Communication signals The communication and sensing channels
  • Reduced computational complexity

  • Extremely training compared to CNN-based estimators

  • Comparable estimation performance to FCDNN-based estimators

  • Practical scenarios and self-interference need to be considered.

  • Data-driven method.

5 DL-based Channel Estimation↩︎

Figure 10: An example of DL-based channel estimator.

Channel estimation and equalization are essential parts of communication systems since the transmitted signals are distorted and reshaped by the channel. Accordingly, the CSI must be frequently estimated, and its impact on the received signals must be removed by channel equalization. CSI estimation is typically performed by transmitting pilot signals within the communication data frame. The receiver estimates the channel by utilizing these pilot signals and performs channel equalization to remove its impact on the received signal. In ISAC systems, the information about the propagation environment obtained by sensing can also be used for channel estimation, or the pilot symbols can be utilized for sensing.

5.1 Conventional Channel Estimation↩︎

Widely used channel estimation techniques are linear methods such as least squares (LS) or linear minimum mean-square error (LMMSE) estimation [152]. However, such linear methods may not be sufficient for ISAC systems because they perform both sensing and communication at the same time, and the interference in received pilot signals due to the sensing can be more complex.

To exemplify, the LS channel estimation strives to solve the following optimization problem to estimate the channel in massive MIMO communication systems [153] as, \[\hat{\mathbf{H}}_{LS} = \mathop{\arg\min}_{\mathbf{H}_c} \|\mathbf{Y}_p-\mathbf{H}_c\mathbf{X}_p\|^2 = \mathbf{Y}_p \mathbf{X}_p^\dagger,\] where \(\mathbf{H}_c\in \mathbb{C}^{M\times K}\) denotes the communication CSI matrix for \(M\) antennas and \(K\) UEs, \(\mathbf{X}_p\in \mathbb{C}^{K\times L}\), denotes the pilot symbols matrix consisting of \(L\) training symbols transmitted by \(K\) UEs. and \(\mathbf{Y}_p\in \mathbb{C}^{M\times L}\) is the signal matrix received by \(M\) antennas during the channel estimation. Moreover, \(\mathbf{X}_p^\dagger\) denotes the pseudo-inverse of the pilot data matrix. Moreover, iterative methods can attain a higher channel estimation accuracy compared to linear estimators [154].

5.2 DL-based Channel Estimation for Communications↩︎

Fig. 10 illustrates a generic system model for DL-based channel estimation, where the trained DL network estimates the channel using the pilot symbols transmitted in the data. The training of the DL network can be performed via supervised learning. Supervised DL-based channel estimation can be performed by utilizing the ground-truth CSI. Let \(\Theta=\{w,b\}\) represent all parameters of the DL network, where \(w\) and \(b\) are the weights and parameters of the neuron, respectively. During the training stage, the model can use MSE as the loss function \(\mathcal{L}(\Theta)\), which is expressed as: \[\mathcal{L}(\Theta)=\frac{1}{N_{train}}\sum_{n=1}^{N_{train}}\|\hat{\mathbf{H}}_{DL}^{(n)}-\mathbf{H}^{(n)}\|^{2},\] where \(N_{train}\) is the number of CSI instances in the training data set, and \(\mathbf{H}\) and \(\hat{\mathbf{H}}_{DL}\) denote the ground truth CSI (or estimated CSI via another method) and DL estimated CSI, respectively.

Table 8: No caption
Criterion Communication ISAC
Output CSI CSI, target parameters
Training data Pilots, CSI Pilots, CSI, range-Doppler maps, range-angle maps, target parameters
Metrics NMSE, BER, SER NMSE, BER, SER, parameter estimation accuracy (e.g., range/velocity/angle RMSE)

DL-based channel estimators for OFDM systems are proposed in [155], [156]. DNN is employed via supervised learning in [155], where it is shown that the DNN-based channel estimator can slightly outperform the LMMSE estimator when the number of training samples is high; however, when the number of training samples is limited, it is performance is degraded. A different approach is employed in [156], where the training of the DNN is performed during the training frame before data transmission. This method has been shown to outperform the LMMSE estimator substantially, and its computational complexity is much lower than that of the LMMSE estimator [156].

The channel estimation is much more challenging in the applications of massive MIMO, IRS, ISAC, and OTFS waveforms. Accordingly, DL-based channel estimators are proposed for massive MIMO systems [157], [158], mm-wave MIMO communications [159], IRS-powered communication [95], [160], [161], OTFS communication systems [162]. Furthermore, DL-based techniques are also proposed for channel tracking in mm-wave vehicular communication and UAV communication networks [160], [163].

5.3 DL-based Channel Estimation for ISAC↩︎

DL-based channel estimation for communication systems only aims to estimate the channel between the base station and UEs, while ISAC systems can estimate both the communication channel and sensing channel that consists of information about target parameters such as velocity, range, and angle [36], [38], [39]. Accordingly, Table [tab:dl95ce95comparison] compares DL-based channel estimation in communication systems and ISAC systems. Moreover, the information obtained about the environment can be utilized to improve the communication channel estimation in ISAC systems [164]. Thus, ISAC systems require a unique channel estimation approach since their signals are designed for both communications and sensing. Accordingly, DL-based channel estimators are also proposed specifically for ISAC systems. Table 7 compares DL-based channel estimation studies for ISAC systems. Liu et al. proposed a DL-based channel estimator for IRS-assisted ISAC systems, where FCDNN and CNN are utilized to estimate the sensing channel and communication channel, respectively [36], [37]. They trained the proposed DNN networks via supervised learning such that pilot signals are inputs and ground-truth channels are the output. This study utilized three DNNs to estimate direct sensing and communication (SAC) channels, IRS-reflected communication, and IRS-reflected sensing channels. Their proposed method outperforms the LS estimator by up to 15dB and 5dB to estimate sensing and communication channels, respectively.

Another DL-based CSI estimator is proposed for OTFS-assisted ISAC systems [38], where CNN and FCDNN layers are employed and trained via supervised learning for communication and sensing channel estimation. This study also employs CNN-based denoising and feature elimination blocks to achieve a better channel estimation performance. As a result, it outperforms sparse Bayesian learning (SBL) and LMMSE estimators regarding sensing and communication performance.

Extreme learning machine (ELM) is also considered for channel estimation in IRS-assisted multi-user ISAC systems [39]. ELM network is an FNN with a single hidden layer that updates its parameters via an inverse operation instead of gradient-based backpropagation, hence achieving swift training and learning. ELM network is trained via supervised learning using the channel dataset. The communication channel estimation performance of the ELM-based estimator is similar to FCDNN-based estimator, and it outperforms the CNN-based and LS estimators, as shown in Fig. 11. On the other hand, its training time is 20% and 2.5% of the FCDNN-based and CNN-based ones, receptively [39].

Figure 11: Comparison of DL-based channel estimation techniques [39].

As seen in the aforementioned studies, DL-based channel estimation studies for ISAC generally utilized FNN, FCDNN, CNN, or ELM with supervised learning, which are data-driven methods. DL-based estimators are demonstrated to outperform linear estimators while maintaining a low computational complexity during inference. However, data-driven methods require a large number of training samples.

Figure 12: DL-based ISAC receiver architecture.
Table 9: DL-based techniques for ISAC receivers.
Ref. Learning Strategy Algorithm Input Output Pros Notes
[40] Supervised Learning FCDNN Received signals
  • Demodulated communication data

  • Target range and velocity estimations

  • Passive sensing parameters

  • ComNet: Better performance than MMSE under Doppler effects

  • SensingNet: Higher accuracy for multi-target parameter estimation

  • Robust to Doppler effects, phase noise and multi-path propagation

  • Lower computational complexity

  • THz OFDM ISAC systems

  • SensingNet: Active sensing parameter estimation

  • ComNet: Simultaneous data symbol detection and passive sensing

[41] Supervised Learning SNN Received signals UWB signals
  • Demodulated communication data

  • Target detection

  • Neuromorphic ISAC

  • Energy-efficient online decoding and sensing

  • Neuromorphic computing for ISAC

  • UWB signaling for ISAC

[42] Supervised Learning FCDNN and LSTM Received communication signals under radar (FMCW) interference Communication data symbols
  • FCDNN has a higher accuracy when the symbol duration is short

  • LSTM outperforms FCDNN when the symbol duration is long

  • Achieves a better performance than the ZF

  • Performance of FCDNN is affected more by time-related distortion than LSTM
[43] Supervised Learning DNN Transformer Received signals
  • Estimated communication data symbols

  • Estimated target parameters: angle of arrival (AOA) and time delay (TD)

  • Robust performance in signal detection with less training
  • Exponentially increasing complexity with the number of antennas
[44] Supervised Learning FCDNN The received data signal, and the estimated CSI matrix, Demodulated communication data and passive sensing results
  • Simultaneous passive sensing and demodulation

  • Comparable sensing and communication performance with state-of-the-art algorithms.

  • Model-based DL-based passive sensing, signal detection, and channel reconstruction modules module
[45] Supervised Learning CNN Channel frequency response (CFR) Estimated UE positions
  • Reduced training time compared to FCDNN

  • Improved position estimation

  • 5G NR indoor positioning
[46] Supervised Learning QNN Beam SNRs Human pose recognition
  • High accuracy, comparable to state-of-the-art DNN models.
  • Proof-of-concept quantum neural networks

  • Commercial WiFi devices are successfully employed for ISAC.

[47] Supervised Learning CNN Correlation matrix of the received signals Target delay and Doppler estimation
  • Eliminate the need for threshold decisions

  • Demonstrate robustness to changes in channel conditions

  • OTFS signals are used for ISAC

  • Target localization in the delay-Doppler domain

[48] Supervised Learning CNN Sensing data matrix Objects/human motion recognition
  • High objects/human motion recognition accuracy

  • Low communication overhead due to exchanging only intermediate computed vectors.

  • Vertical federated edge learning

  • Distributed sensing via DL

6 DL-based Receiver Techniques↩︎

Conventional receiver algorithms generally employ linear techniques that have low complexity for demodulation, decoding, and signal processing. However, the sophisticated structure of ISAC waveforms may render such linear methods insufficient to reach the desired communication and sensing performance. On the other hand, non-linear and iterative algorithms tend to have high computational complexity and demand a significant amount of computational power and energy. Accordingly, DL-based techniques have recently been considered for the development of highly energy-efficient and practical receiver algorithms. DL-based techniques have already been considered for various communication receiver operations, such as for spectrum sensing [165], channel equalization, and signal demodulation [166], [167].

Developing an ISAC receiver typically demands more sophisticated algorithms and techniques than the transmitter techniques since hardware impairments, interference, synchronization (time, phase, and frequency) problems, or imperfect CSI estimation can easily degrade the performance of receiver algorithms and signal processing. Hence, the receiver techniques need to be robust to these problems. Fig. 12 illustrates an exemplary DL-based ISAC receiver architecture, where after obtaining the baseband signals via receiver RF chains and ADCs, the DL-based techniques are applied to the baseband signals for channel estimation, sensing processing, demodulation of the data, and radar target classification. Supervised learning is generally preferred in these studies since communication symbol estimation and sensing parameter estimation require foreknowledge of the communication symbols or parameters estimation.

Designing different architectures or combining multiple stages within a single DNN is also possible as a different architecture. Table 9 summarizes the DL-based receiver ISAC studies, where DL-based techniques perform various blocks of the receiver signal processing, such as demodulating the communication data, estimating the target range and velocity, or target detection.

Figure 13: Demodulation performance of various DL-based receivers for 64-QAM signals.

6.1 Data Demodulation↩︎

Hardware impairments, noise, interference, carrier signal phase or frequency offsets, or imperfect CSI can significantly degrade the demodulation performance of the receiver. To overcome these, DL-based demodulation techniques have recently been proposed [167][169], outperforming conventional demodulation techniques. For instance, researchers suggested a transformer-based method to demodulate QPSK signals at ISAC receivers in [43], which is demonstrated to outperform other DL-based demodulators. Fig 13 compares the performance of DL-based demodulators for the demodulation of 64-QAM symbols, where the transformer-based modulator proposed in [43] outperforms the FCDNN-based, LSTM-based, CNN-based, and LS demodulators when the same data set is used for training. Moreover, it shows that the FCDNN-based and LSTM-based demodulators also outperform the LS demodulator, especially when the SNR is low.

Figure 14: Radar target classification and recognition using CNNs.

Another study presented in [44] utilizes an FCDNN architecture to demodulate the communication symbols while simultaneously processing the received signals for sensing. On the other hand, a waveform for Terahertz (THz) ISAC systems is proposed in [40], which is based on discrete Fourier transform spread orthogonal frequency division multiplexing (SI-DFT-s-OFDM). They also developed an ISAC receiver incorporating two neural networks that demodulate the communication data and estimate target range and velocity under hardware imperfections and non-linearities of THz systems, enhancing communication and sensing performance. Moreover, it alleviates the Doppler effects and phase noise and can handle multi-target estimation. An FCDNN and LSTM-based architecture is proposed to improve the data demodulation performance under radar interference in [42], which performs comparably to traditional detectors without requiring interference cancellation. Moreover, a neuromorphic computing solution based on a spiking neural network (SNN) for ultrawideband (UWB) impulse radio ISAC systems is proposed [41], where received impulse signals are processed via an SNN for simultaneous demodulation of the communication data and target detection. Utilizing SNN instead of DNN provides a more energy-efficient solution for UWB ISAC systems.

6.2 Radar Signal Processing↩︎

Sensing processing in the ISAC receiver incorporates multiple stages, including receive beamforming, creating the sensing data matrix, target detection, target parameter estimation, and target classification and recognition, similar to traditional radar systems. DL-based architecture is already applied in multiple stages of traditional radar systems, such as target detection, parameter estimation, and target classification and recognition.

DL-based algorithms for radar signal processing have been increasingly studied in recent years, especially for radar waveform and array design, radar waveform recognition, target recognition and classification, and also suppression of jamming, clutter, and interference [96], [170][177]. Some of these methods utilize supervised learning, such as [170], [172], to classify or recognize the targets in synthetic-aperture radar images. Moreover, self-supervised learning, which is a subset of unsupervised learning, is also considered for target recognition [178]. Self-supervised models learn the representative characteristics from unlabeled data themselves without requiring labeled data. Furthermore, transfer learning is also employed for the target recognition and classification [173], [175]. In general, CNN-based algorithms are used for radar receiver techniques since they can be efficiently applied to radar images, e.g., range-velocity and angle-range images. These studies mentioned above considered only radar systems. Radar signal processing in ISAC systems is reviewed below under two categories: target detection and parameter estimation, and human gesture and motion recognition.

6.3 Target Detection and Parameter Estimation↩︎

Range, velocity, and angle are the main target parameters that are aimed to be estimated in radar systems after detecting targets. Estimating these parameters in highly sophisticated environments and with low SNRs becomes challenging. Consequently, DL-based techniques have already been widely studied to estimate such parameters in ISAC systems. Supervised learning with FCDNN is utilized for passive and active sensing and target parameter estimation in THz systems [40], where the radar processing delivered high accuracy while having a lower computational complexity than MUSIC. In another study, UWB signals are processed via spiking neural networks, i.e., neuromorphic computing, to perform target detection in a UWB impulse radio system [41]. Moreover, a DNN transformer architecture is employed to jointly estimate the communication data symbols and the range and angle of the targets, providing a robust estimation performance [43]. Model-based DL is also considered to jointly perform demodulation and passive sensing [44], which reduces the training time and improves the sensing performance. Moreover, target delay and Doppler estimation for OTFS signals are also studied using CNN in [47], where the proposed DL-based target parameter estimator can estimate the target parameters without using a threshold, and it is robust to variations of the channel. The aforementioned studies mainly employ the supervised learning approach to estimate the target parameters, while CNN, FCDNN, and Transformers are employed as the architectures.

6.4 Human Gesture and Motion Recognition↩︎

Human gesture and motion recognition can be performed via active or passive sensing. Moreover, ISAC signaling can leverage human gesture and motion recognition. For instance, indoor ISAC systems can recognize human motions when communicating with indoor devices to provide sensing data for security, health care, or other applications. A vertical federated edge learning technique is proposed to recognize objects or human motions by utilizing distributed ISAC signals in [48], where distributed edge devices employ ISAC signals for sensing and share intermediate computed vectors for collaborative sensing. This method reaches around 98% recognition accuracy, resulting in 8% accuracy enhancement compared to the benchmark methods. Moreover, a proof-of-concept study has proposed a quantum neural network (QNN) architecture for human pose recognition, which achieves a similar estimation accuracy compared to state-of-the-art methods[46]. Further studies on human gesture and motion recognition powered by ISAC can improve security, privacy, and healthcare applications.

Table 10: No caption
Network type Real multiplications
MLP \(N_N N_I\)
1D-CNN \(N_F N_I N_K N_O\)
RNN \(N_S N_H (N_I + N_H)\)
LSTM \(N_S N_H (4N_I + 4N_H + 3)\)

Table 11: No caption
Optimization-based Model-based DL Data-driven DL
Training Data - Less Data Data-hungry
Training Time - Short Long
Execution Time Long (0.1 \(-\) 30 seconds) Short (microseconds \(-\) milliseconds) Short (microseconds \(-\) milliseconds)

7 Computational Complexity of DL-based Techniques↩︎

One of the major advantages of utilizing DL-based techniques is to deliver near-optimum results with low computational complexity compared to iterative or optimization-based methods. Although their training may take time due to requiring a large amount of data, their execution time can be in microseconds or milliseconds, enabling their implementation in real-time systems. This section highlights the computational complexity reduction offered by DL-based techniques in comparison with iterative or optimization-based methods.

Table [tab:real95multiplications] compares a computational complexity metric, namely real multiplications for each layer, for widely used NN architectures, where \(N_N\), \(N_I\), \(N_F\), \(N_K\), \(N_O\), \(N_S\), \(N_H\), \(N_I\) denote the number of neurons, number of features in the input vector, number of filters, kernel size, output size, input kernel time sequence size, and number of hidden units, respectively [179]. It can be seen that the computational complexities of DL-based techniques are mainly related to their architectures, hence, it is difficult to provide a direct computational complexity comparison between the DL-based techniques and optimization-based or iterative methods. Therefore, many studies compare their complexities in terms of execution times. Table [tab:complexity95com] presents a comparison of optimization-based, model-based, and data-driven methods in terms of execution times and performance. The details of this comparison are explained in the training complexity and inference complexity subsections below.

7.1 Training Complexity↩︎

The training of DL-based techniques generally requires a large amount of data and long training times. The training times of learning-based methods are mainly related to NN architecture, input and output sizes, and training data set size. However, various techniques have also been proposed to reduce the training time of DL-based techniques. For instance, for the same amount of data, an extreme learning machine, which is a single-layer NN architecture and does not employ gradient during training, can be trained 5 times faster than FCDNN, while achieving a similar channel estimation performance with FCDNN for channel estimation [39]. On the other hand, the amount of data required and training time can be substantially reduced by model-based, e.g., deep-unfolding, methods since these methods utilize domain knowledge, leading to more computationally efficient training with less data [180]. Thus, carefully designing a problem-specific NN architecture that incorporates domain knowledge can reduce training times and the amount of data required for training.

7.2 Inference Complexity↩︎

The DL-based techniques can be swiftly executed since only matrix operations need to be performed during inference. This greatly reduces the execution time compared to optimization-based methods. For instance, two iterative methods were proposed for symbol-level ISAC precoder design, one of which employs penalty dual decomposition, majorization-minimization, and block coordinate descent methods to iteratively design the precoder, while the other one employs the augmented Lagrangian method with Riemannian Broyden-Fletcher-Goldfarb Shanno algorithm. The execution times of these algorithms are 9.91 seconds and 0.233 seconds, respectively [181]. To reduce the execution time, the DL-based symbol-level ISAC precoding methods are proposed [182], which can design the sub-optimum ISAC waveforms within 0.01-0.02 seconds. Note that the iterative algorithms mentioned above outperform DL-based techniques in terms of communication sum rate, however, DL-based techniques offer more practical implementation compared to iterative methods since real-time communication systems may need to swiftly generate a precoder every few hundred milliseconds due to varying channel conditions. It is observed that the execution time of iterative methods can take up to 10 s or more, depending on the number of antennas and UEs, while corresponding DL-based techniques can be executed in a few hundred milliseconds, in most of the studies [40], [180][184]. Moreover, the execution time of iterative or optimization-based methods may exponentially increase with the number of antennas, while the execution time of DL-based techniques slightly increases with the number of antennas, since DL-based techniques mainly perform matrix and vector multiplications that can be efficiently executed in parallel [180], [184].

It is worth noting that DNN architecture and its size also determine the inference time. However, DNN models can also be further optimized to reduce their computational complexity, execution time, and memory usage via weight quantization, pruning, and knowledge distillation [185]. For instance, a DL-based ISAC precoder with 6-bit quantized and 10% pruned DNN is shown to achieve 96.1% of the sum rate achieved by the complete DNN model. At the same time, its memory usage and computational requirements are only 16.88% of the complete DNN model [27].

In addition to the computational advantages presented above, DL-based techniques can run on specifically developed low-power NN accelerators or GPU-based hardware that can execute them swiftly with high energy efficiency[186]. Such low-power NN accelerators can achieve very high energy efficiency, e.g., around 25TFLOPS/W, while consuming only a few hundred milliwatts of power [64], [187]. This makes DL-based techniques more practical compared to optimization-based methods, even for low-power edge and IoT devices [188]. Consequently, DL-based techniques can be used in base stations and UEs to develop ISAC systems without causing a significant computational burden and power consumption.

8 Challenges and Future Research Directions↩︎

The fusion of DL with signal processing techniques for joint sensing and communications holds significant promise for future networks. ISAC can potentially transform various systems and technologies, including autonomous vehicles and smart cities. Even though DL-based techniques can remarkably improve the performance and energy efficiency of ISAC systems, significant challenges still need to be addressed. These challenges also pave the way for opportunities and future research directions. In this section, we present the challenges encountered in DL-based ISAC systems and possible related future research directions.

8.1 Challenges for DL-based Techniques for ISAC↩︎

While DL-based techniques may significantly enhance the performance of ISAC systems and enable their implementation, several challenges must be addressed to fully realize their potential in real-time and sophisticated networks, as:

  • Data Availability and Reliability: To train DL models via supervised or unsupervised learning approaches, a large amount of data representing the realistic ISAC scenarios and channels needs to be collected in advance. This data can be obtained through measurements [139], [189], or realistic system simulations, such as using computationally expensive ray tracing-based simulations[190]. However, obtaining data for all possible ISAC scenarios can be extremely time-consuming or expensive.

  • Model Complexity: Although DL models excel at producing near-optimal solutions for various tasks, their complexity can be prohibitive, especially when a large number of layers and nodes are involved or sophisticated architectures like LSTM and transformers are employed in the model. This significantly increases the computational complexity of training, requiring highly powerful and costly computational resources [191], [192].

  • Interpretability and Predictability: Data-driven DL models operate as black boxes, hence their decision-making processes remain largely opaque and are not yet fully understood [193]. Furthermore, their behavior in unseen scenarios is unpredictable, rendering them unsuitable for critical applications where reliability and transparency are necessary.

  • Scalability and Generalization: DL models are typically trained for a specific number of inputs and outputs using a dataset consisting of particular cases. Thus, these models are optimized for scenarios that closely resemble the training data, which may limit their generalization to unforeseen situations. However, DL-based techniques for ISAC systems must be flexible and scalable to handle swiftly varying parameters such as the number of UEs, the trade-off between the sensing and communications, interference between the sensing and communication signals, and clutter conditions [27]. Moreover, DL models need to be scalable and flexible in terms of resource scheduling, data management, parallelization, and training [89].

  • Hardware Limitations: DL models need to operate in real-time, hence their computational complexity must be low to operate on limited computational and memory resources [194]. Especially, techniques for UEs must have low computational complexity and power consumption due to the hardware limitations and energy constraints of commonly used UEs, such as smartphones and IoT devices. [195].

  • Networking and Cooperation: Networking of multiple ISAC cells is necessary to improve both sensing performance and communication coverage. Thus, the DL-based techniques developed for ISAC need to be able to work in cooperation with each other and share data between models in a network. Networking is also necessary to reduce the interference between the communication and sensing tasks of base stations. Moreover, this networking and cooperation need to be performed securely to maximize the sensing privacy and communication data security. Especially FL-based approaches can be utilized to enable secure networking and cooperation[48], [196].

The challenges presented above need to be addressed before the deployment of DL-based techniques in ISAC networks. Thus, there exist significant open research opportunities, which are categorized and discussed below.

8.2 Model-based Deep Learning for ISAC↩︎

One of the challenges encountered is the black-box structure of data-driven DL-based techniques, hence, they are not interpretable, and they may produce unpredictable results in some situations [197]. To overcome this issue, communication and signal processing theory and domain knowledge can be utilized within DL techniques to design model-based DL approaches for ISAC. Model-based DL methods incorporate prior knowledge or theories about the system into the learning process, hence leading to more explainable AI models [88], [120]. Model-based DL, therefore, leads to more efficient, accurate, and understandable models for ISAC applications [20], [198].

Model-based DL methods are designed to replicate the steps of signal processing algorithms by neural network layers to learn and predict various system parameters of ISAC systems or optimize their performance by intelligently adapting to changing environments or requirements. Developing model-based DL techniques requires solid domain knowledge in addition to knowledge of DL architectures. Model-based DL can be developed for numerous modules of ISAC systems, such as waveform design, channel estimation, and communication and sensing data processing [20], [184].

8.3 Scalable and Distributed Deep Learning Models↩︎

One of the fundamental problems with using DL in ISAC systems is the limited scalability of the DL models [199]. DL models are generally trained to operate with a fixed number of inputs and outputs. For instance, changing the number of antennas or UEs may require re-training the model if it is developed based on a conventional DL model. Hence, more studies are necessary to address the scalability of DL-based techniques for ISAC systems. For instance, model-based DL techniques can be one of the solutions for scalability issues.

On the other hand, distributed learning techniques, especially FL, can be applied in ISAC systems to enhance their scalability at a network level. FL will enable training large models without sharing enormous amounts of data and causing privacy concerns [48]. Multi-cell ISAC networks or IoT networks will significantly benefit from distributed learning approaches since each base station and the UE will also facilitate the scalability of the entire network.

8.4 Lightweight Deep Learning Models↩︎

Although training DL models may require high computational resources, inference of trained DL models can be performed with much less computational complexity. Hence, they can be run even on resource-limited low-power devices such as mobile devices or IoT nodes [194], [195]. Moreover, the computational resource requirement of DL models can be further reduced by various methods such as node pruning, weight pruning, quantization, and knowledge distillation without significantly compromising their performance. [200]. Consequently, it is possible to develop lightweight DL models. For instance, quantization and pruning are used to reduce the computational complexity, memory usage, and improve the energy efficiency of DL-based precoder for ISAC systems [27].

Lightweight DL models are designed to be efficient and compact, making them suitable for environments with limited computational resources. These models are particularly useful in applications operating on resource-constrained devices such as ash mobile devices, embedded systems, or IoT devices, where computing power, memory, and energy are constrained [200]. The goal of lightweight models is to maintain a balance between model size, speed, and accuracy. Lightweight DL models will also reduce the hardware cost and increase the energy efficiency.

8.5 Interference Cancellation↩︎

The received signals may include interference from various sources, including self-interference, inter-channel interference, interference from sensing signals, and other devices. For instance, inter-user interference, inter-cell interference, self-interference, or interference between communication and radar systems are commonly observed [26], [201], [202] in communication systems. Accordingly, ISAC receivers need to perform interference cancellation to enhance the performance of demodulation and sensing, especially in congested RF environments. DL algorithms can be employed to predict and alleviate interference patterns. AI-driven adaptive algorithms are then used to dynamically adjust system parameters in real-time based on the interference environment. DL-based interference cancellation techniques are proposed for MIMO and non-orthogonal multiple access (NOMA) communication systems [203][206]. Interference cancellation at the receiver of ISAC systems is more complicated than communication or sensing systems. Thus, DL-based techniques need to be explored for interference cancellation in ISAC systems.

8.6 Target Recognition and Classification↩︎

DL-based architectures are superior in target classification and recognition compared to conventional methods [172][174]. CNN-based methods are widely used for target recognition and classification since they require sensing images obtained via ISAC or radar systems.

Target recognition and classification have been explored in radar systems; however, they have not yet been applied in the ISAC systems. CNN-based methods can also be used with ISAC sensing images, and they can be fine-tuned to utilize the features of ISAC signals instead of pure radar signals to improve target parameter estimation, recognition, and classification [47], [65].

8.7 Synchronization↩︎

In communication systems, achieving synchronization at the receiver end is crucial for accurately decoding signals. This process involves three key components: time, frequency, and phase synchronization. Time synchronization ensures that the receiver correctly identifies each symbol or data packet’s start and end, aligning its internal clock with the transmitter’s timing. Frequency synchronization adjusts the receiver’s frequency to match the transmitter’s, compensating for any drift or discrepancy that might occur due to Doppler shifts or oscillator inaccuracies. Phase synchronization is necessary to maintain the integrity of the signal’s phase information, which is critical for decoding complex modulation schemes. Collectively, these synchronization mechanisms enable the receiver to accurately reconstruct the transmitted data, ensuring efficient and reliable communication.

DL-based techniques have already been applied for the synchronization in communication systems [207][210]. Synchronization in ISAC systems is more challenging than only communication systems due to the requirement for synchronization for both communication and sensing, especially in the case of distributed ISAC systems. In a distributed ISAC system, the synchronization between the ISAC base station and UEs may require a substantial amount of communication overhead. Thus, DL-based techniques can be developed to perform real-time synchronization in ISAC systems with a limited amount of communication overhead.

8.8 Networking and Data Fusion↩︎

Networking of communication systems, i.e., multi-cell communication, enhances the network’s coverage and enables better interference and spectrum management. On the other hand, networking radar sensors or sensing data fusion enables target localization, improves sensing performance and coverage, and provides robustness against jamming [211][213]. Thus, networking is necessary for both communication and sensing systems. ISAC systems need to be networked to provide a communication infrastructure within a larger area, reduce interference, fuse the sensing data to deliver more accurate sensing, and enable more efficient utilization of resources [196].

The networking of ISAC systems is a relatively recent topic; hence, it has numerous research opportunities. For instance, interference management is a complex problem since various sources of ISAC transmitters can interfere with each other. Coordinated control of closely operating transmitters is required to minimize the interference; however, reaching an optimum strategy can be challenging due to having a large number of transmitters or parameters. DL or RL-based coordination can handle this complexity, enabling cooperative sensing and mitigating interference among multiple ISAC cells [214]. ISAC network architecture can be designed to utilize FL to maximize the both sensing and communication performances [196], [215], improve the privacy of the sensing data [48], [216], reduce the communication overheads [217], and resource allocation [218] in ISAC networks.

8.9 Integrated Sensing and Semantic Communications↩︎

Semantic communication is a new paradigm that transmits semantic information (meanings) rather than bits, hence substantially increasing the amount of information transmitted. Moreover, semantic communication also improves data security since the semantic information needs to be extracted from the received bits. The interpretation of the received bits and their transformation into semantic information can be performed by DL-based techniques, such as transformers and large language models (LLMs) [219], [220].

Semantic communication can be considered within ISAC systems towards 6G and beyond communication networks to improve information transmission rates and data security [221]. A transformer-based method is proposed to estimate the semantic communication and sensing channel while reducing the piloting overhead [222]. Another study proposed a semantic-based CSI feedback method that utilizes autoencoders to reduce the feedback overhead [223]. Moreover, a DRL-based semantic-aware resource allocation method is proposed for vision-assisted ISAC systems [224]. Semantic communication can be considered within ISAC systems towards 6G and beyond communication networks to improve information transmission rates and data security [221]. Moreover, the acquired sensing information, along with communications in ISAC, can also enhance the performance of semantic communication by providing information about the channel and environment to the ISAC nodes.

8.10 Realistic System Models and Simulations↩︎

Most ISAC scenarios use some simplified assumptions due to the high complexity of real scenarios. However, implementing DL-based techniques will allow researchers to study more realistic scenarios. Modeling such scenarios is necessary to understand the practical benefits of ISAC systems and related research problems. For instance, the SDP3 simulation framework, which is based on DL, is proposed to model an ISAC system and predict the performance and trade-offs of ISAC systems under realistic scenarios. [225].

The ISAC systems can also be studied and optimized for various realistic applications, such as autonomous driving, where an ISAC system can effectively provide wireless communication and sensing functions, reducing the amount of hardware, cost, and energy consumption. [226]. Such systems can be modeled in a more realistic way to evaluate the practical benefits of ISAC.

8.11 Prototype Development↩︎

The real-time implementation of DL techniques requires specific hardware for energy and hardware-efficient operations instead of using general-purpose CPU architectures. Thus, many hardware platforms have already been developed for DL implementation. Even small IoT devices can now have DL accelerators that significantly improve energy efficiency. A recent survey of ML and DL acceleration platforms shows that a wide range of design techniques are used to design hardware and energy-efficient DL acceleration platforms, such as neural approximation, in-memory computing, and multi-stage acceleration[186]. Such hardware platforms are developed with various hardware architectures such as FPGA [227], ASIC, in-memory [186], and GPU [228]. Low-cost and low-power architectures are essential, especially for IoT and edge computing devices that operate on batteries [227], [229].

Prototype development is also an essential stage in proving the performance of DL-based ISAC techniques. It involves building an initial version of the ISAC system to show its features, usability, and overall functionality. Moreover, measurements in the lab and field trials can provide insight into their performance in real-world applications. Such prototypes can include various DL-based algorithms for ISAC transceivers to generate the ISAC signals, demodulate and decode the communication data, process the sensing data, and recognize the target. Such prototype development can be performed using various available DL accelerators and RF hardware. For instance, Jetson Nano or FPGAs can be used for efficient and accelerated DL inference [230]. On the other hand, RFSoC [231], [232] and software-defined radio (SDR) platforms [233], [234] can be utilized for real-time analog and RF signal processing.

9 Conclusion↩︎

This article has reviewed the DL-based techniques for ISAC design and optimization and summarized future directions and research opportunities in this area. DL-based techniques can enable the implementation of ISAC systems in 6G and beyond communication networks by reducing the amount of hardware used, computational complexity, and energy consumption. The powerful data-driven and model-based DL techniques offer tremendous opportunities for waveform design, channel estimation, and receiver design for ISAC systems, as seen in the state-of-the-art studies reviewed in this survey.

A wide range of DL methods, such as FCDNN, CNN, LSTM, FL, RL, and transformers can be employed. These DL architectures can be trained by supervised learning, unsupervised learning, or semi-supervised learning strategies over distributed hardware to realize near-optimum techniques for ISAC systems that can operate in real-time. On the other hand, the scalability and flexibility of DL-based algorithms, the ability to generate sufficient data for training, the implementation of these methods on mobile devices, and network-level ISAC systems need to be explored further to effectively employ them in future generation wireless networks.

Acknowledgment↩︎

This work was supported in parts by the NSFC Grants 62361136811, 62174091, 62201294, TUBITAK Grant 123N800, METU BAP Grant AGEP-301-2025-11558, and EPSRC Grant EP/S028455/1.

References↩︎

[1]
M. Ashraf, B. Tan, D. Moltchanov, J. S. Thompson, and M. Valkama, “Joint optimization of radar and communications performance in 6G cellular systems,” IEEE Transactions on Green Communications and Networking, vol. 7, no. 1, pp. 522–536, March 2023.
[2]
M. Temiz, E. Alsusa, and M. W. Baidas, “Optimized precoders for massive MIMOOFDM dual radar-communication systems,” IEEE Transactions on Communications, vol. 69, no. 7, pp. 4781–4794, 2021.
[3]
J. A. Zhang, F. Liu, C. Masouros, R. W. Heath, Z. Feng, L. Zheng, and A. Petropulu, “An overview of signal processing techniques for joint communication and radar sensing,” IEEE Journal of Selected Topics in Signal Processing, vol. 15, no. 6, pp. 1295–1315, Nov 2021.
[4]
A. Liu, Z. Huang, M. Li, Y. Wan, W. Li, T. X. Han, C. Liu, R. Du, D. K. P. Tan, J. Lu, Y. Shen, F. Colone, and K. Chetty, “A survey on fundamental limits of integrated sensing and communication,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 994–1034, Secondquarter 2022.
[5]
W. Zhou, R. Zhang, G. Chen, and W. Wu, “Integrated sensing and communication waveform design: A survey,” IEEE Open Journal of the Communications Society, vol. 3, pp. 1930–1949, 2022.
[6]
Z. Wei, H. Qu, Y. Wang, X. Yuan, H. Wu, Y. Du, K. Han, N. Zhang, and Z. Feng, “Integrated sensing and communication signals toward 5G-A and 6G: a survey,” IEEE Internet of Things Journal, vol. 10, no. 13, pp. 11 068–11 092, July 2023.
[7]
J. Wang, N. Varshney, C. Gentile, S. Blandino, J. Chuang, and N. Golmie, “Integrated sensing and communication: Enabling techniques, applications, tools and data sets, standardization, and future directions,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23 416–23 440, Dec 2022.
[8]
R. Liu, M. Li, H. Luo, Q. Liu, and A. L. Swindlehurst, “Integrated sensing and communication with reconfigurable intelligent surfaces: Opportunities, applications, and future directions,” IEEE Wireless Communications, vol. 30, no. 1, pp. 50–57, February 2023.
[9]
S. Lu, F. Liu, Y. Li, K. Zhang, H. Huang, J. Zou, X. Li, Y. Dong, F. Dong, J. Zhu, Y. Xiong, W. Yuan, Y. Cui, and L. Hanzo, “Integrated sensing and communications: Recent advances and ten open challenges,” IEEE Internet of Things Journal, pp. 1–1, 2024.
[10]
M. Ade Krisna Respati and B. M. Lee, “A survey on machine learning enhanced integrated sensing and communication systems: Architectures, algorithms, and applications,” IEEE Access, vol. 12, pp. 170 946–170 964, 2024.
[11]
U. Demirhan and A. Alkhateeb, “Integrated sensing and communication for 6G: Ten key machine learning roles,” 2022.
[12]
J. Jagannath, N. Polosky, A. Jagannath, F. Restuccia, and T. Melodia, “Machine learning for wireless communications in the internet of things: A comprehensive survey,” Ad Hoc Networks, vol. 93, p. 101913, 2019.
[13]
J. Du, C. Jiang, J. Wang, Y. Ren, and M. Debbah, “Machine learning for 6G wireless networks: Carrying forward enhanced bandwidth, massive access, and ultrareliable/low-latency service,” IEEE Vehicular Technology Magazine, vol. 15, no. 4, pp. 122–134, 2020.
[14]
N. C. Luong, D. T. Hoang, S. Gong, D. Niyato, P. Wang, Y.-C. Liang, and D. I. Kim, “Applications of deep reinforcement learning in communications and networking: A survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3133–3174, 2019.
[15]
C. Zhang, P. Patras, and H. Haddadi, “Deep learning in mobile and wireless networking: A survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2224–2287, thirdquarter 2019.
[16]
S. Hu, X. Chen, W. Ni, E. Hossain, and X. Wang, “Distributed machine learning for wireless communication networks: Techniques, architectures, and applications,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1458–1493, 2021.
[17]
I. Ahmad, S. Shahabuddin, H. Malik, E. Harjula, T. Leppänen, L. Lovén, A. Anttonen, A. H. Sodhro, M. Mahtab Alam, M. Juntti, A. Ylä-Jääski, T. Sauter, A. Gurtov, M. Ylianttila, and J. Riekki, “Machine learning meets communication networks: Current trends and future challenges,” IEEE Access, vol. 8, pp. 223 418–223 460, 2020.
[18]
S. Dörner, S. Cammerer, J. Hoydis, and S. t. Brink, “Deep learning based communication over the air,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 132–143, 2018.
[19]
J. Liu, J. Huang, Y. Zhou, X. Li, S. Ji, H. Xiong, and D. Dou, “From distributed machine learning to federated learning: A survey,” Knowledge and Information Systems, vol. 64, no. 4, pp. 885–917, 2022.
[20]
P. Pulkkinen and V. Koivunen, “Model-based online learning for active ISAC waveform optimization,” IEEE Journal of Selected Topics in Signal Processing, pp. 1–15, 2024.
[21]
——, “Model-free online learning for waveform optimization in integrated sensing and communications,” in ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2023, pp. 1–5.
[22]
Y. Zheng, R. Liu, M. Li, and Q. Liu, “End-to-end learning for SLP-BasedISAC systems,” arXiv preprint arXiv:2401.05663, 2024.
[23]
Z. Kang and Q. He, “Learning-based joint waveform optimization and receiver design for dual-functional MIMO radar and communications,” in 2023 31st European Signal Processing Conference (EUSIPCO), 2023, pp. 710–714.
[24]
J. M. Mateos-Ramos, J. Song, Y. Wu, C. Häger, M. F. Keskin, V. Yajnanarayana, and H. Wymeersch, “End-to-end learning for integrated sensing and communication,” in ICC 2022 - IEEE International Conference on Communications, vol. 42, no. 3, Jul. 2022, pp. 1942–1947.
[25]
L. Xu, S. Sun, Y. D. Zhang, and A. P. Petropulu, “Reconfigurable beamforming for automotive radar sensing and communication: A deep reinforcement learning approach,” IEEE Journal of Selected Areas in Sensors, pp. 1–15, 2024.
[26]
X. Liu, H. Zhang, K. Long, A. Nallanathan, and V. C. Leung, “Distributed unsupervised learning for interference management in integrated sensing and communication systems,” IEEE Transactions on Wireless Communications, 2023.
[27]
M. Temiz and C. Masouros, “Unsupervised learning-based low-complexity integrated sensing and communication precoder design,” IEEE Open Journal of the Communications Society, pp. 1–1, 2025.
[28]
C. Liu, W. Yuan, S. Li, X. Liu, H. Li, D. W. K. Ng, and Y. Li, “Learning-based predictive beamforming for integrated sensing and communication in vehicular networks,” IEEE Journal on Selected Areas in Communications, vol. 40, no. 8, pp. 2317–2334, 2022.
[29]
C. Liu, X. Liu, S. Li, W. Yuan, and D. W. K. Ng, “Deep clstm for predictive beamforming in integrated sensing and communication-enabled vehicular networks,” Journal of Communications and Information Networks, vol. 7, no. 3, pp. 269–277, 2022.
[30]
C. Liu, W. Yuan, S. Li, X. Liu, D. W. K. Ng, and Y. Li, “Predictive beamforming for integrated sensing and communication in vehicular networks: A deep learning approach,” in ICC 2022 - IEEE International Conference on Communications, 2022, pp. 1948–1954.
[31]
Y. Zhang, S. Li, D. Li, J. Zhu, and Q. Guan, “Transformer-based predictive beamforming for integrated sensing and communication in vehicular networks,” IEEE Internet of Things Journal, vol. 11, no. 11, pp. 20 690–20 705, June 2024.
[32]
Y. Wang, W. Liang, L. Li, J. Zhang, and C. M. Angelopoulos, “Intelligent predictive beamforming for integrated sensing and communication based vehicular-to-infrastructure systems,” in 2023 IEEE Globecom Workshops (GC Wkshps).IEEE, 2023, pp. 401–406.
[33]
H. Zhang, S. Gao, X. Cheng, and L. Yang, “Integrated sensing and communications towards proactive beamforming in mmWaveV2I via multi-modal feature fusion (mmff),” IEEE Transactions on Wireless Communications, pp. 1–1, 2024.
[34]
X. Zhang, W. Yuan, C. Liu, J. Wu, and D. W. K. Ng, “Predictive beamforming for vehicles with complex behaviors in ISAC systems: A deep learning approach,” IEEE Journal of Selected Topics in Signal Processing, 2024.
[35]
J. Mu, Y. Gong, F. Zhang, Y. Cui, F. Zheng, and X. Jing, “Integrated sensing and communication-enabled predictive beamforming with deep learning in vehicular networks,” IEEE Communications Letters, vol. 25, no. 10, pp. 3301–3304, 2021.
[36]
Y. Liu, I. Al-Nahhal, O. A. Dobre, and F. Wang, “Deep-learning-based channel estimation for IRS-assistedISAC system,” GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp. 4220–4225, 2022.
[37]
——, “Deep-learning channel estimation for IRS-assisted integrated sensing and communication system,” IEEE Transactions on Vehicular Technology, vol. 72, no. 5, pp. 6181–6193, 2023.
[38]
X. Zhang, H. Huang, L. Tan, W. Yuan, and C. Liu, “Enhanced channel estimation for OTFS-assisted ISAC in vehicular networks: A deep learning approach,” in 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).IEEE, 2023, pp. 703–707.
[39]
Y. Liu, I. Al-Nahhal, O. A. Dobre, F. Wang, and H. Shin, “Extreme learning machine-based channel estimation in IRS-assisted multi-user ISAC system,” IEEE Transactions on Communications, 2023.
[40]
Y. Wu, F. Lemic, C. Han, and Z. Chen, “Sensing integrated DFT-spread OFDM waveform and deep learning-powered receiver design for terahertz integrated sensing and communication systems,” IEEE Trans. Commun., vol. 71, no. 1, pp. 595–610, Jan. 2023.
[41]
J. Chen, N. Skatchkovsky, and O. Simeone, “Neuromorphic Integrated Sensing and Communications,” IEEE Wireless Commun. Lett., vol. 12, no. 3, pp. 476–480, Mar. 2023.
[42]
C. Liu, Y. Chen, and S.-H. Yang, “Deep learning based detection for communications systems with radar interference,” IEEE Trans. Veh. Technol., vol. 71, no. 6, pp. 6245–6254, Jun. 2022.
[43]
J. Hu, I. Valiulahi, and C. Masouros, ISAC receiver design: A learning-based two-stage joint data-and-target parameter estimation,” IEEE Wireless Communications Letters, 2024.
[44]
W. Jiang, D. Ma, Z. Wei, Z. Feng, P. Zhang, and J. Peng, ISAC-NET: model-driven deep learning for integrated passive sensing and communication,” IEEE Transactions on Communications, 2024.
[45]
K. Gao, H. Wang, H. Lv, and W. Liu, “Toward 5G NR High-Precision Indoor Positioning via Channel Frequency Response: A New Paradigm and Dataset Generation Method,” IEEE J. Select. Areas Commun., vol. 40, no. 7, pp. 2233–2247, Jul. 2022.
[46]
T. Koike-Akino, P. Wang, and Y. Wang, AutoQML: Automated Quantum Machine Learning for Wi-Fi Integrated Sensing and Communications,” in 2022 IEEE 12th Sensor Array and Multichannel Signal Processing Workshop (SAM).Trondheim, Norway: IEEE, Jun. 2022, pp. 360–364.
[47]
L. M.-M. Suárez, K. Chen-Hu, M. J. F.-G. García, and A. G. Armada, “Deep Learning-aided Robust Integrated Sensing and Communications with OTFS and Superimposed Training,” in 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom).Dubrovnik, Croatia: IEEE, Sep. 2023, pp. 1–6.
[48]
P. Liu, G. Zhu, W. Jiang, W. Luo, J. Xu, and S. Cui, “Vertical Federated Edge Learning With Distributed Integrated Sensing and Communication,” IEEE Commun. Lett., vol. 26, no. 9, pp. 2091–2095, Sep. 2022.
[49]
Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” nature, vol. 521, no. 7553, pp. 436–444, 2015.
[50]
P. Cunningham, M. Cord, and S. J. Delany, “Supervised learning,” in Machine learning techniques for multimedia: case studies on organization and retrieval.Springer, 2008, pp. 21–49.
[51]
S. Suthaharan and S. Suthaharan, “Supervised learning algorithms,” Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning, pp. 183–206, 2016.
[52]
T. Jiang, J. L. Gradus, and A. J. Rosellini, “Supervised machine learning: a brief primer,” Behavior therapy, vol. 51, no. 5, pp. 675–687, 2020.
[53]
R. Caruana and A. Niculescu-Mizil, “An empirical comparison of supervised learning algorithms,” in Proceedings of the 23rd international conference on Machine learning, 2006, pp. 161–168.
[54]
Y. Tian, D. Su, S. Lauria, and X. Liu, “Recent advances on loss functions in deep learning for computer vision,” Neurocomputing, vol. 497, pp. 129–158, 2022.
[55]
C. Shorten, T. M. Khoshgoftaar, and B. Furht, “Text data augmentation for deep learning,” Journal of big Data, vol. 8, no. 1, p. 101, 2021.
[56]
D. A. Van Dyk and X.-L. Meng, “The art of data augmentation,” Journal of Computational and Graphical Statistics, vol. 10, no. 1, pp. 1–50, 2001.
[57]
Z. Ghahramani, Unsupervised Learning.Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 72–112.
[58]
R. Nikbakht, A. Jonsson, and A. Lozano, “Unsupervised learning for parametric optimization,” IEEE Communications Letters, vol. 25, no. 3, pp. 678–681, 2021.
[59]
K. G. Dizaji, F. Zheng, N. Sadoughi, Y. Yang, C. Deng, and H. Huang, “Unsupervised deep generative adversarial hashing network,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 3664–3673.
[60]
C. Sun, D. Liu, and C. Yang, “Model-free unsupervised learning for optimization problems with constraints,” in 2019 25th Asia-Pacific Conference on Communications (APCC), 2019, pp. 392–397.
[61]
J. Ye, L. Huang, Z. Chen, P. Zhang, and M. Rihan, “Unsupervised learning for joint beamforming design in RIS-AidedISAC systems,” IEEE Wireless Communications Letters, vol. 13, no. 8, pp. 2100–2104, Aug 2024.
[62]
D. Liu, C. Sun, C. Yang, and L. Hanzo, “Optimizing wireless systems using unsupervised and reinforced-unsupervised deep learning,” IEEE Network, vol. 34, no. 4, pp. 270–277, 2020.
[63]
J. E. Van Engelen and H. H. Hoos, “A survey on semi-supervised learning,” Machine learning, vol. 109, no. 2, pp. 373–440, 2020.
[64]
W.-Y. Lee, L. Jovanov, A. Kumcu, and W. Philips, ARC: Automotive radar consistency regularization for semi-supervised learning,” IEEE Transactions on Intelligent Vehicles, pp. 1–16, 2023.
[65]
J. M. Mateos-Ramos, B. Chatelier, C. Häger, M. F. Keskin, L. Le Magoarou, and H. Wymeersch, “Semi-supervised end-to-end learning for integrated sensing and communications,” in 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), May 2024, pp. 132–138.
[66]
X. Yang, Z. Song, I. King, and Z. Xu, “A survey on deep semi-supervised learning,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 9, pp. 8934–8954, 2022.
[67]
Y. Chen, M. Mancini, X. Zhu, and Z. Akata, “Semi-supervised and unsupervised deep visual learning: A survey,” IEEE transactions on pattern analysis and machine intelligence, vol. 46, no. 3, pp. 1327–1347, 2022.
[68]
S. Laine and T. Aila, “Temporal ensembling for semi-supervised learning,” arXiv preprint arXiv:1610.02242, 2016.
[69]
A. Oliver, A. Odena, C. A. Raffel, E. D. Cubuk, and I. Goodfellow, “Realistic evaluation of deep semi-supervised learning algorithms,” Advances in neural information processing systems, vol. 31, 2018.
[70]
L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” Journal of artificial intelligence research, vol. 4, pp. 237–285, 1996.
[71]
S. Kuutti, R. Bowden, Y. Jin, P. Barber, and S. Fallah, “A survey of deep learning applications to autonomous vehicle control,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 2, pp. 712–733, 2020.
[72]
P. L. Bartlett, “An introduction to reinforcement learning theory: Value function methods,” in Advanced Lectures on Machine Learning: Machine Learning Summer School 2002 Canberra, Australia, February 11–22, 2002 Revised Lectures.Springer, 2003, pp. 184–202.
[73]
K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, “Deep reinforcement learning: A brief survey,” IEEE Signal Processing Magazine, vol. 34, no. 6, pp. 26–38, 2017.
[74]
A. Feriani and E. Hossain, “Single and multi-agent deep reinforcement learning for AI-enabled wireless networks: A tutorial,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1226–1252, 2021.
[75]
B. R. Kiran, I. Sobh, V. Talpaert, P. Mannion, A. A. Al Sallab, S. Yogamani, and P. Pérez, “Deep reinforcement learning for autonomous driving: A survey,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 6, pp. 4909–4926, 2021.
[76]
N. Girelli Consolaro, S. S. Shinde, D. Naseh, and D. Tarchi, “Analysis and performance evaluation of transfer learning algorithms for 6G wireless networks,” Electronics, vol. 12, no. 15, p. 3327, 2023.
[77]
B. Yang, O. Fagbohungbe, X. Cao, C. Yuen, L. Qian, D. Niyato, and Y. Zhang, “A joint energy and latency framework for transfer learning over 5g industrial edge networks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 531–541, 2021.
[78]
A. M. Nagib, H. Abou-Zeid, and H. S. Hassanein, “Safe and accelerated deep reinforcement learning-based o-ran slicing: A hybrid transfer learning approach,” IEEE Journal on Selected Areas in Communications, 2023.
[79]
R. W. Coutinho and A. Boukerche, “Transfer learning for disruptive 5g-enabled industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4000–4007, 2021.
[80]
J. Liang, L. Li, and C. Zhao, “A transfer learning approach for compressed sensing in 6G-IoT,” IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15 276–15 283, 2021.
[81]
J. Verbraeken, M. Wolting, J. Katzy, J. Kloppenburg, T. Verbelen, and J. S. Rellermeyer, “A survey on distributed machine learning,” Acm computing surveys (csur), vol. 53, no. 2, pp. 1–33, 2020.
[82]
E. P. Xing, Q. Ho, P. Xie, and D. Wei, “Strategies and principles of distributed machine learning on big data,” Engineering, vol. 2, no. 2, pp. 179–195, 2016.
[83]
S. AbdulRahman, H. Tout, H. Ould-Slimane, A. Mourad, C. Talhi, and M. Guizani, “A survey on federated learning: The journey from centralized to distributed on-site learning and beyond,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5476–5497, 2020.
[84]
M. Chen, D. Gündüz, K. Huang, W. Saad, M. Bennis, A. V. Feljan, and H. V. Poor, “Distributed learning in wireless networks: Recent progress and future challenges,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 12, pp. 3579–3605, 2021.
[85]
S. F. Ahmed, M. S. B. Alam, M. Hassan, M. R. Rozbu, T. Ishtiak, N. Rafa, M. Mofijur, A. Shawkat Ali, and A. H. Gandomi, “Deep learning modelling techniques: current progress, applications, advantages, and challenges,” Artificial Intelligence Review, vol. 56, no. 11, pp. 13 521–13 617, 2023.
[86]
I. Goodfellow, Y. Bengio, and A. Courville, Deep learning.MIT press, 2016.
[87]
L. Dai, R. Jiao, F. Adachi, H. V. Poor, and L. Hanzo, “Deep learning for wireless communications: An emerging interdisciplinary paradigm,” IEEE Wireless Communications, vol. 27, no. 4, pp. 133–139, 2020.
[88]
N. Shlezinger, J. Whang, Y. C. Eldar, and A. G. Dimakis, “Model-based deep learning,” Proceedings of the IEEE, 2023.
[89]
R. Mayer and H.-A. Jacobsen, “Scalable deep learning on distributed infrastructures: Challenges, techniques, and tools,” ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1–37, 2020.
[90]
M. Zawish, S. Davy, and L. Abraham, “Complexity-driven model compression for resource-constrained deep learning on edge,” IEEE Transactions on Artificial Intelligence, vol. 5, no. 8, pp. 3886–3901, 2024.
[91]
Z. Lyu, Y. Li, G. Zhu, J. Xu, H. Vincent Poor, and S. Cui, “Rethinking resource management in edge learning: A joint pre-training and fine-tuning design paradigm,” IEEE Transactions on Wireless Communications, vol. 24, no. 2, pp. 1584–1601, Feb 2025.
[92]
T. Erpek, T. J. O’Shea, Y. E. Sagduyu, Y. Shi, and T. C. Clancy, “Deep learning for wireless communications,” Development and Analysis of Deep Learning Architectures, pp. 223–266, 2020.
[93]
B. Ozpoyraz, A. T. Dogukan, Y. Gevez, U. Altun, and E. Basar, “Deep learning-aided 6G wireless networks: A comprehensive survey of revolutionary PHY architectures,” IEEE Open Journal of the Communications Society, vol. 3, pp. 1749–1809, 2022.
[94]
T. N. Sainath, O. Vinyals, A. Senior, and H. Sak, “Convolutional, long short-term memory, fully connected deep neural networks,” in 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP).Ieee, 2015, pp. 4580–4584.
[95]
T. Gao and M. He, “Two-stage channel estimation using convolutional neural networks for IRS-assisted mmWave systems,” IEEE Systems Journal, 2023.
[96]
Z. Geng, H. Yan, J. Zhang, and D. Zhu, “Deep-learning for radar: A survey,” IEEE Access, vol. 9, pp. 141 800–141 818, 2021.
[97]
W. De Mulder, S. Bethard, and M.-F. Moens, “A survey on the application of recurrent neural networks to statistical language modeling,” Computer Speech & Language, vol. 30, no. 1, pp. 61–98, 2015.
[98]
M. Sundermeyer, H. Ney, and R. Schlüter, “From feedforward to recurrent LSTM neural networks for language modeling,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 3, pp. 517–529, 2015.
[99]
Y. Yu, X. Si, C. Hu, and J. Zhang, “A review of recurrent neural networks: LSTM cells and network architectures,” Neural computation, vol. 31, no. 7, pp. 1235–1270, 2019.
[100]
C. Nguyen, T. M. Hoang, and A. A. Cheema, “Channel estimation using CNN-LSTM in RIS-NOMA assisted 6G network,” IEEE Transactions on Machine Learning in Communications and Networking, 2023.
[101]
J. Pan, H. Shan, R. Li, Y. Wu, W. Wu, and T. Q. Quek, “Channel estimation based on deep learning in vehicle-to-everything environments,” IEEE Communications Letters, vol. 25, no. 6, pp. 1891–1895, 2021.
[102]
A. S. M. Mohammed, A. I. A. Taman, A. M. Hassan, and A. Zekry, “Deep learning channel estimation for OFDM5G systems with different channel models,” Wireless Personal Communications, vol. 128, no. 4, pp. 2891–2912, 2023.
[103]
Z. Wang and V. W. Wong, “Deep learning for ISAC-enabled end-to-end predictive beamforming in vehicular networks,” in ICC 2023-IEEE International Conference on Communications.IEEE, 2023, pp. 5713–5718.
[104]
J. Zhai, S. Zhang, J. Chen, and Q. He, “Autoencoder and its various variants,” in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2018, pp. 415–419.
[105]
C. Zou, F. Yang, J. Song, and Z. Han, “Channel autoencoder for wireless communication: State of the art, challenges, and trends,” IEEE Communications Magazine, vol. 59, no. 5, pp. 136–142, 2021.
[106]
S. Kokalj-Filipovic, R. Miller, and J. Morman, “Autoencoders for training compact deep learning RF classifiers for wireless protocols,” in 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).IEEE, 2019, pp. 1–5.
[107]
C. Zou, F. Yang, J. Song, and Z. Han, “Generative adversarial network for wireless communication: Principle, application, and trends,” IEEE Communications Magazine, vol. 62, no. 5, pp. 58–64, May 2024.
[108]
Y. Shi, X. Zhang, Q. Hu, and H. Cheng, “Data recovery algorithm based on generative adversarial networks in crowd sensing internet of things,” Personal and Ubiquitous Computing, pp. 1–14, 2023.
[109]
H. Tang, Y. Zhao, G. Wang, C. Luo, and W. Wang, “Wireless signal denoising using conditional generative adversarial networks,” in IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2023, pp. 1–6.
[110]
T. Kohonen, “Essentials of the self-organizing map,” Neural networks, vol. 37, pp. 52–65, 2013.
[111]
H. Yin, “The self-organizing maps: background, theories, extensions and applications,” in Computational intelligence: A compendium.Springer, 2008, pp. 715–762.
[112]
A. Allahdadi, D. Pernes, J. S. Cardoso, and R. Morla, “Hidden markov models on a self-organizing map for anomaly detection in 802.11 wireless networks,” Neural Computing and Applications, vol. 33, no. 14, pp. 8777–8794, 2021.
[113]
G. Gad, A. Farrag, A. Aboulfotouh, K. Bedda, Z. M. Fadlullah, and M. M. Fouda, “Joint self-organizing maps and knowledge distillation-based communication-efficient federated learning for resource-constrained UAV-IoT systems,” IEEE Internet of Things Journal, 2024.
[114]
E. Ertin and K. L. Priddy, “Self-localization of wireless sensor networks using self-organizing maps,” in Intelligent Computing: Theory and Applications III, vol. 5803.SPIE, 2005, pp. 138–145.
[115]
J. Liu, Z. Wang, and M. Xu, DeepMTT: A deep learning maneuvering target-tracking algorithm based on bidirectional LSTM network,” Information Fusion, vol. 53, pp. 289–304, 2020.
[116]
C. Liu, M. Xia, J. Zhao, H. Li, and Y. Gong, “Optimal resource allocation for integrated sensing and communications in internet of vehicles: A deep reinforcement learning approach,” IEEE Transactions on Vehicular Technology, vol. 74, no. 2, pp. 3028–3038, Feb 2025.
[117]
C. Li, L. Chai, Y. Zhang, M. Yang, R. Zhao, Z. Zhang, D. Li, and S. Wan, “Deep reinforcement learning-based resource allocation with enhanced perception and low-latency for autonomous driving in ISAC-aidedVEC,” ACM Transactions on Design Automation of Electronic Systems, vol. 30, no. 3, pp. 1–34, 2025.
[118]
H. Lin, Z. Zhang, L. Wei, Z. Zhou, and T. Zheng, “A deep reinforcement learning based UAV trajectory planning method for integrated sensing and communications networks,” in 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 2023, pp. 1–6.
[119]
S. Zhang, S. Zhang, W. Yuan, and T. Q. S. Quek, “Transformer-empowered predictive beamforming for rate-splitting multiple access in non-terrestrial networks,” IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 19 776–19 788, Dec 2024.
[120]
A. Zappone, M. Di Renzo, and M. Debbah, “Wireless networks design in the era of deep learning: Model-based, AI-based, or both?” IEEE Transactions on Communications, vol. 67, no. 10, pp. 7331–7376, 2019.
[121]
A. Mohammad, C. Masouros, and Y. Andreopoulos, “An unsupervised deep unfolding framework for robust symbol level precoding,” IEEE Open Journal of the Communications Society, 2023.
[122]
C. M. Bishop, “Pattern recognition and machine learning,” Springer google schola, vol. 2, pp. 1122–1128, 2006.
[123]
E. Alpaydin, Machine learning.MIT press, 2021.
[124]
W. G. Hatcher and W. Yu, “A survey of deep learning: Platforms, applications and emerging research trends,” IEEE access, vol. 6, pp. 24 411–24 432, 2018.
[125]
M. Wang, W. Fu, X. He, S. Hao, and X. Wu, “A survey on large-scale machine learning,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 6, pp. 2574–2594, 2022.
[126]
H. Andersson, “Joint communication and sensing in 6g networks,” Ericsson Blog, 2021.
[127]
A. Bayesteh, J. He, Y. Chen, P. Zhu, J. Ma, A. Shaban, Z. Yu, Y. Zhang, Z. Zhou, and G. Wang, “Integrated sensing and communication (ISAC)—from concept to practice,” Communications of Huawei Research, pp. 4–25, 2022.
[128]
X. Cheng, D. Duan, S. Gao, and L. Yang, “Integrated sensing and communications (ISAC) for vehicular communication networks (VCN),” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23 441–23 451, 2022.
[129]
M. Temiz, E. Alsusa, and M. W. Baidas, “A dual-functional massive MIMOOFDM communication and radar transmitter architecture,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 14 974–14 988, 2020.
[130]
C. B. Barneto, T. Riihonen, M. Turunen, L. Anttila, M. Fleischer, K. Stadius, J. Ryynänen, and M. Valkama, “Full-duplex OFDM radar with LTE and 5GNR waveforms: Challenges, solutions, and measurements,” IEEE Transactions on Microwave Theory and Techniques, vol. 67, no. 10, pp. 4042–4054, 2019.
[131]
Y. Chen, J. Zhang, W. Feng, and M.-S. Alouini, “Radio sensing using 5g signals: Concepts, state of the art, and challenges,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1037–1052, 2022.
[132]
M. Temiz, E. Alsusa, and M. W. Baidas, “A dual-function massive MIMO uplink OFDM communication and radar architecture,” IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 2, pp. 750–762, 2021.
[133]
Y. Wan, Z. Hu, A. Liu, R. Du, T. X. Han, and T. Q. Quek, OFDM-Based multiband sensing for ISAC: resolution limit, algorithm design, and open issues,” IEEE Vehicular Technology Magazine, pp. 2–10, 2024.
[134]
H. Hawkins, C. Xu, L.-L. Yang, and L. Hanzo, IM-OFDMISAC outperforms OFDMISAC by combining multiple sensing observations,” IEEE Open Journal of Vehicular Technology, 2024.
[135]
C. Sturm and W. Wiesbeck, “Waveform design and signal processing aspects for fusion of wireless communications and radar sensing,” Proceedings of the IEEE, vol. 99, no. 7, pp. 1236–1259, 2011.
[136]
J. B. Sanson, P. M. Tomé, D. Castanheira, A. Gameiro, and P. P. Monteiro, “High-resolution delay-doppler estimation using received communication signals for OFDM radar-communication system,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 112–13 123, 2020.
[137]
L. Gaudio, M. Kobayashi, G. Caire, and G. Colavolpe, “On the effectiveness of OTFS for joint radar parameter estimation and communication,” IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 5951–5965, 2020.
[138]
L. Gaudio, G. Colavolpe, and G. Caire, OTFS vs. OFDM in the presence of sparsity: A fair comparison,” IEEE Transactions on Wireless Communications, vol. 21, no. 6, pp. 4410–4423, June 2022.
[139]
M. Temiz, C. Horne, N. J. Peters, M. A. Ritchie, and C. Masouros, “An experimental study of radar-centric transmission for integrated sensing and communications,” IEEE Transactions on Microwave Theory and Techniques, vol. 71, no. 7, pp. 3203–3216, July 2023.
[140]
M. Temiz, N. J. Peters, C. Horne, M. A. Ritchie, and C. Masouros, “Radar-centric ISAC through index modulation: Over-the-air experimentation and trade-offs,” in 2023 IEEE Radar Conference (RadarConf23).IEEE, 2023, pp. 1–6.
[141]
M. Bekar, C. J. Baker, E. G. Hoare, and M. Gashinova, “Joint MIMO radar and communication system using a PSK-LFM waveform with TDM and CDM approaches,” IEEE Sensors Journal, vol. 21, no. 5, pp. 6115–6124, 2020.
[142]
Z. Dou, X. Zhong, and W. Zhang, “Radar-communication integration based on MSK-LFM spread spectrum signal,” International Journal of Communications, Network and System Sciences, vol. 10, pp. 108–117, 01 2017.
[143]
F. Liu, L. Zhou, C. Masouros, A. Li, W. Luo, and A. Petropulu, “Toward dual-functional radar-communication systems: Optimal waveform design,” IEEE Transactions on Signal Processing, vol. 66, no. 16, pp. 4264–4279, 2018.
[144]
T. Abatzoglou and G. Gheen, “Range, radial velocity, and acceleration MLE using radar LFM pulse train,” IEEE Transactions on Aerospace and Electronic Systems, vol. 34, no. 4, pp. 1070–1083, Oct 1998.
[145]
F. Liu, Y.-F. Liu, A. Li, C. Masouros, and Y. C. Eldar, “Cramér-rao bound optimization for joint radar-communication beamforming,” IEEE Transactions on Signal Processing, vol. 70, pp. 240–253, 2021.
[146]
M. S. Greco, P. Stinco, F. Gini, and A. Farina, “Cramer-Rao bounds and selection of bistatic channels for multistatic radar systems,” IEEE Transactions on Aerospace and Electronic Systems, vol. 47, no. 4, pp. 2934–2948, October 2011.
[147]
H. Dahrouj, R. Alghamdi, H. Alwazani, S. Bahanshal, A. A. Ahmad, A. Faisal, R. Shalabi, R. Alhadrami, A. Subasi, M. T. Al-Nory, O. Kittaneh, and J. S. Shamma, “An overview of machine learning-based techniques for solving optimization problems in communications and signal processing,” IEEE Access, vol. 9, pp. 74 908–74 938, 2021.
[148]
M. Li, S. Kolouri, and J. Mohammadi, “Learning to solve optimization problems with hard linear constraints,” IEEE Access, vol. 11, pp. 59 995–60 004, 2023.
[149]
A. Chowdhury, G. Verma, C. Rao, A. Swami, and S. Segarra, “Unfolding WMMSE using graph neural networks for efficient power allocation,” IEEE Transactions on Wireless Communications, vol. 20, no. 9, pp. 6004–6017, 2021.
[150]
J. Shi, A.-A. Lu, W. Zhong, X. Gao, and G. Y. Li, “Robust WMMSE precoder with deep learning design for massive MIMO,” IEEE Transactions on Communications, 2023.
[151]
W. Yuan, F. Liu, C. Masouros, J. Yuan, D. W. K. Ng, and N. González-Prelcic, “Bayesian predictive beamforming for vehicular networks: A low-overhead joint radar-communication approach,” IEEE Transactions on Wireless Communications, vol. 20, no. 3, pp. 1442–1456, 2021.
[152]
Y. Liu, Z. Tan, H. Hu, L. J. Cimini, and G. Y. Li, “Channel estimation for OFDM,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1891–1908, 2014.
[153]
D. Neumann, M. Joham, and W. Utschick, “Channel estimation in massive MIMO systems,” arXiv preprint arXiv:1503.08691, 2015.
[154]
M. Nicoli, S. Ferrara, and U. Spagnolini, “Soft-iterative channel estimation: Methods and performance analysis,” IEEE transactions on signal processing, vol. 55, no. 6, pp. 2993–3006, 2007.
[155]
K. Mei, J. Liu, X. Zhang, N. Rajatheva, and J. Wei, “Performance analysis on machine learning-based channel estimation,” IEEE Transactions on Communications, vol. 69, no. 8, pp. 5183–5193, 2021.
[156]
B. A. Jebur, S. H. Alkassar, M. A. Abdullah, and C. C. Tsimenidis, “Efficient machine learning-enhanced channel estimation for OFDM systems,” IEEE Access, vol. 9, pp. 100 839–100 850, 2021.
[157]
E. Balevi, A. Doshi, and J. G. Andrews, “Massive MIMO channel estimation with an untrained deep neural network,” IEEE Transactions on Wireless Communications, vol. 19, no. 3, pp. 2079–2090, 2020.
[158]
X. Ma and Z. Gao, “Data-driven deep learning to design pilot and channel estimator for massive MIMO,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5677–5682, 2020.
[159]
H. He, C.-K. Wen, S. Jin, and G. Y. Li, “Deep learning-based channel estimation for beamspace mmWave massive MIMO systems,” IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 852–855, 2018.
[160]
J. Yu, X. Liu, Y. Gao, C. Zhang, and W. Zhang, “Deep learning for channel tracking in IRS-assistedUAV communication systems,” IEEE Transactions on Wireless Communications, vol. 21, no. 9, pp. 7711–7722, 2022.
[161]
Z. Zhang, T. Ji, H. Shi, C. Li, Y. Huang, and L. Yang, “A self-supervised learning-based channel estimation for IRS-aided communication without ground truth,” IEEE Transactions on Wireless Communications, 2023.
[162]
M. Payami and S. D. Blostein, “Deep learning-based channel estimation for massive MIMO-OTFS communication systems,” in 2024 Wireless Telecommunications Symposium (WTS).IEEE, 2024, pp. 1–6.
[163]
S. Moon, H. Kim, and I. Hwang, “Deep learning-based channel estimation and tracking for millimeter-wave vehicular communications,” Journal of Communications and Networks, vol. 22, no. 3, pp. 177–184, 2020.
[164]
C. Qing, W. Hu, Z. Liu, G. Ling, X. Cai, and P. Du, “Sensing-aided channel estimation in OFDM systems by leveraging communication echoes,” IEEE Internet of Things Journal, vol. 11, no. 23, pp. 38 023–38 039, Dec 2024.
[165]
R. Ahmed, Y. Chen, B. Hassan, L. Du, T. Hassan, and J. Dias, “Hybrid machine-learning-based spectrum sensing and allocation with adaptive congestion-aware modeling in CR-assisted IoV networks,” IEEE Internet of Things Journal, vol. 9, no. 24, pp. 25 100–25 116, 2022.
[166]
M. Honkala, D. Korpi, and J. M. Huttunen, DeepRx: fully convolutional deep learning receiver,” IEEE Transactions on Wireless Communications, vol. 20, no. 6, pp. 3925–3940, 2021.
[167]
H. Wang, Z. Wu, S. Ma, S. Lu, H. Zhang, G. Ding, and S. Li, “Deep learning for signal demodulation in physical layer wireless communications: Prototype platform, open dataset, and analytics,” IEEE Access, vol. 7, pp. 30 792–30 801, 2019.
[168]
L. Zhang, H. Zhang, Y. Jiang, and Z. Wu, “Intelligent and reliable deep learning LSTM neural networks-based OFDM-DCSK demodulation design,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 16 163–16 167, Dec 2020.
[169]
A. Ahmad, S. Agarwal, S. Darshi, and S. Chakravarty, “Deepdemod: BPSK demodulation using deep learning over software-defined radio,” IEEE Access, vol. 10, pp. 115 833–115 848, 2022.
[170]
J. Pei, Y. Huang, W. Huo, Y. Zhang, J. Yang, and T.-S. Yeo, SAR automatic target recognition based on multiview deep learning framework,” IEEE Transactions on Geoscience and Remote Sensing, vol. 56, no. 4, pp. 2196–2210, 2018.
[171]
Z. Wen, Z. Liu, S. Zhang, and Q. Pan, “Rotation awareness based self-supervised learning for SAR target recognition with limited training samples,” IEEE Transactions on Image Processing, vol. 30, pp. 7266–7279, 2021.
[172]
D. He, W. Guo, T. Zhang, Z. Zhang, and W. Yu, “Occluded target recognition in SAR imagery with scattering excitation learning and channel dropout,” IEEE Geoscience and Remote Sensing Letters, vol. 20, pp. 1–5, 2023.
[173]
J. Liu and Q. Xu, “Radar target classification based on high resolution range profile segmentation and ensemble classification,” IEEE Sensors Letters, vol. 5, no. 4, pp. 1–4, Mar. 2021.
[174]
H. Zhu, W. Wang, and R. Leung, SAR target classification based on radar image luminance analysis by deep learning,” IEEE Sensors Letters, vol. 4, no. 3, pp. 1–4, 2020.
[175]
S. Feng, K. Ji, L. Zhang, X. Ma, and G. Kuang, SAR target classification based on integration of ASC parts model and deep learning algorithm,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 14, pp. 10 213–10 225, 2021.
[176]
T. Lin, X. Chen, X. Tang, L. He, S. He, and Q. Hu, “Radar spectral maps classification based on deep learning,” in Proceedings of the 2020 International Conference on Computer Communication and Information Systems, ser. CCCIS 2020.New York, NY, USA: Association for Computing Machinery, Sep. 2020, p. 29–33.
[177]
J. M. Topple and J. A. Fawcett, MiNet: Efficient deep learning automatic target recognition for small autonomous vehicles,” IEEE Geoscience and Remote Sensing Letters, vol. 18, no. 6, pp. 1014–1018, June 2021.
[178]
M. Muzeau, C. Ren, S. Angelliaume, M. Datcu, and J.-P. Ovarlez, “Self-supervised learning based anomaly detection in synthetic aperture radar imaging,” IEEE Open Journal of Signal Processing, vol. 3, pp. 440–449, 2022.
[179]
P. Freire, S. Srivallapanondh, B. Spinnler, A. Napoli, N. Costa, J. E. Prilepsky, and S. K. Turitsyn, “Computational complexity optimization of neural network-based equalizers in digital signal processing: A comprehensive approach,” Journal of Lightwave Technology, vol. 42, no. 12, pp. 4177–4201, June 2024.
[180]
J. Zhang, C. Masouros, F. Liu, Y. Huang, and A. L. Swindlehurst, “Low-complexity joint radar-communication beamforming: From optimization to deep unfolding,” IEEE Journal of Selected Topics in Signal Processing, pp. 1–16, 2025.
[181]
R. Liu, M. Li, Q. Liu, and A. L. Swindlehurst, “Dual-functional radar-communication waveform design: A symbol-level precoding approach,” IEEE Journal of Selected Topics in Signal Processing, vol. 15, no. 6, pp. 1316–1331, 2021.
[182]
P. Jiang, M. Li, R. Liu, W. Wang, and Q. Liu, SLP-based dual-functional waveform design for ISAC systems: A deep learning approach,” IEEE Transactions on Vehicular Technology, pp. 1–15, 2025.
[183]
Q. Qi, X. Chen, C. Zhong, C. Yuen, and Z. Zhang, “Deep learning-based design of uplink integrated sensing and communication,” IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp. 10 639–10 652, Sep. 2024.
[184]
J. Zhang, M. Liu, J. Tang, N. Zhao, D. Niyato, and X. Wang, “Joint design for ris-aided ISAC via deep unfolding learning,” IEEE Transactions on Cognitive Communications and Networking, vol. 11, no. 1, pp. 349–361, Feb 2025.
[185]
V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, “Efficient processing of deep neural networks: A tutorial and survey,” Proceedings of the IEEE, vol. 105, no. 12, pp. 2295–2329, Dec 2017.
[186]
S. Bavikadi, A. Dhavlle, A. Ganguly, A. Haridass, H. Hendy, C. Merkel, V. J. Reddi, P. R. Sutradhar, A. Joseph, and S. M. Pudukotai Dinakarrao, “A survey on machine learning accelerators and evolutionary hardware platforms,” IEEE Design & Test, vol. 39, no. 3, pp. 91–116, 2022.
[187]
C. Latotzke and T. Gemmeke, “Efficiency versus accuracy: A review of design techniques for DNN hardware accelerators,” IEEE Access, vol. 9, pp. 9785–9799, 2021.
[188]
J. Lee, S. Kang, J. Lee, D. Shin, D. Han, and H.-J. Yoo, “The hardware and algorithm co-design for energy-efficient DNN processor on edge/mobile devices,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67, no. 10, pp. 3458–3470, Oct 2020.
[189]
T. Xu, F. Liu, C. Masouros, and I. Darwazeh, “An experimental proof of concept for integrated sensing and communications waveform design,” IEEE Open Journal of the Communications Society, vol. 3, pp. 1643–1655, 2022.
[190]
T. Liu, K. Guan, D. He, P. T. Mathiopoulos, K. Yu, Z. Zhong, and M. Guizani, 6G integrated sensing and communications channel modeling: Challenges and opportunities,” IEEE Vehicular Technology Magazine, vol. 19, no. 2, pp. 31–40, June 2024.
[191]
Q. Fournier, G. M. Caron, and D. Aloise, “A practical survey on faster and lighter transformers,” ACM Computing Surveys, vol. 55, no. 14s, Jul. 2023.
[192]
X. Hu, L. Chu, J. Pei, W. Liu, and J. Bian, “Model complexity of deep learning: A survey,” Knowledge and Information Systems, vol. 63, pp. 2585–2619, 2021.
[193]
S. Chakraborty, R. Tomsett, R. Raghavendra, D. Harborne, M. Alzantot, F. Cerutti, M. Srivastava, A. Preece, S. Julier, R. M. Rao et al., “Interpretability of deep learning models: A survey of results,” in 2017 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computed, scalable computing & communications, cloud & big data computing, Internet of people and smart city innovation (smartworld/SCALCOM/UIC/ATC/CBDcom/IOP/SCI).IEEE, 2017, pp. 1–6.
[194]
C. Chen, P. Zhang, H. Zhang, J. Dai, Y. Yi, H. Zhang, and Y. Zhang, “Deep learning on computational-resource-limited platforms: A survey,” Mobile Information Systems, vol. 2020, no. 1, p. 8454327, 2020.
[195]
H. Li, K. Ota, and M. Dong, “Learning IoT in edge: Deep learning for the internet of things with edge computing,” IEEE network, vol. 32, no. 1, pp. 96–101, 2018.
[196]
L. Jiang, K. Meng, M. Temiz, J. Hu, and C. Masouros, “Federated learning strategies for coordinated beamforming in multicell ISAC,” arXiv preprint arXiv:2501.16951, 2025.
[197]
X. Li, H. Xiong, X. Li, X. Wu, X. Zhang, J. Liu, J. Bian, and D. Dou, “Interpretable deep learning: Interpretation, interpretability, trustworthiness, and beyond,” Knowledge and Information Systems, vol. 64, no. 12, pp. 3197–3234, 2022.
[198]
J. M. Mateos-Ramos, C. Häger, M. F. Keskin, L. L. Magoarou, and H. Wymeersch, “Model-based end-to-end learning for multi-target integrated sensing and communication,” arXiv preprint arXiv:2307.04111, 2023.
[199]
Y. Xu, F. Yin, W. Xu, C.-H. Lee, J. Lin, and S. Cui, “Scalable learning paradigms for data-driven wireless communication,” IEEE Communications Magazine, vol. 58, no. 10, pp. 81–87, 2020.
[200]
C.-H. Wang, K.-Y. Huang, Y. Yao, J.-C. Chen, H.-H. Shuai, and W.-H. Cheng, “Lightweight deep learning: An overview,” IEEE Consumer Electronics Magazine, vol. 13, no. 4, pp. 51–64, July 2024.
[201]
L. Zheng, M. Lops, Y. C. Eldar, and X. Wang, “Radar and communication coexistence: An overview: A review of recent methods,” IEEE Signal Processing Magazine, vol. 36, no. 5, pp. 85–99, 2019.
[202]
A. R. Chiriyath, B. Paul, and D. W. Bliss, “Radar-communications convergence: Coexistence, cooperation, and co-design,” IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 1, pp. 1–12, 2017.
[203]
I. Sim, Y. G. Sun, D. Lee, S. H. Kim, J. Lee, J.-H. Kim, Y. Shin, and J. Y. Kim, “Deep learning based successive interference cancellation scheme in nonorthogonal multiple access downlink network,” Energies, vol. 13, no. 23, p. 6237, 2020.
[204]
T. Van Luong, N. Shlezinger, C. Xu, T. M. Hoang, Y. C. Eldar, and L. Hanzo, “Deep learning based successive interference cancellation for the non-orthogonal downlink,” IEEE transactions on vehicular technology, vol. 71, no. 11, pp. 11 876–11 888, 2022.
[205]
H. Guo, S. Wu, H. Wang, and M. Daneshmand, DSIC: Deep learning based self-interference cancellation for in-band full duplex wireless,” in 2019 IEEE Global Communications Conference (GLOBECOM).IEEE, 2019, pp. 1–6.
[206]
N. Shlezinger, R. Fu, and Y. C. Eldar, DeepSIC: Deep soft interference cancellation for multiuser MIMO detection,” IEEE Transactions on Wireless Communications, vol. 20, no. 2, pp. 1349–1362, 2020.
[207]
F. A. Aoudia, J. Hoydis, S. Cammerer, M. Van Keirsbilck, and A. Keller, “Deep learning-based synchronization for uplink NB-IoT,” in GLOBECOM 2022-2022 IEEE Global Communications Conference.IEEE, 2022, pp. 1478–1483.
[208]
Q. Zhang, Y. Guan, H. Li, K. Xiong, and Z. Song, “Distributed deep learning-based signal classification for time–frequency synchronization in wireless networks,” Computer Communications, vol. 201, pp. 37–47, 2023.
[209]
E. Abakasanga, N. Shlezinger, and R. Dabora, “Unsupervised deep-learning for distributed clock synchronization in wireless networks,” IEEE Transactions on Vehicular Technology, vol. 72, no. 9, pp. 12 234–12 247, 2023.
[210]
H. Wu, Z. Sun, and X. Zhou, “Deep learning-based frame and timing synchronization for end-to-end communications,” in Journal of Physics: Conference Series, vol. 1169, no. 1.IOP Publishing, 2019, p. 012060.
[211]
M. Temiz, H. Griffiths, and M. A. Ritchie, “Improved target localization in multiwaveform multiband hybrid multistatic radar networks,” IEEE Sensors Journal, vol. 22, no. 21, pp. 20 785–20 796, Nov 2022.
[212]
D. Dhulashia, M. Temiz, and M. A. Ritchie, “Jamming effects on hybrid multistatic radar network range and velocity estimation errors,” IEEE Access, vol. 10, pp. 27 736–27 749, 2022.
[213]
Z. Jing, J. Mu, X. Li, Q. Zhou, and Q. Tian, “Efficient fusion and reconstruction for communication and sensing signals in green IoT networks,” IEEE Internet of Things Journal, vol. 10, no. 11, pp. 9319–9328, 2023.
[214]
B. Lu, Z. Wei, H. Wu, X. Zeng, L. Wang, X. Lu, D. Mei, and Z. Feng, “Deep-learning-based multinode ISAC4D environmental reconstruction with uplink–downlink cooperation,” IEEE Internet of Things Journal, vol. 11, no. 24, pp. 39 512–39 526, Dec 2024.
[215]
X. Liu, H. Zhang, K. Sun, K. Long, and G. Karagiannidis, AI-driven integration of sensing and communication in the 6G era,” IEEE Network, 2023.
[216]
S. Hu, X. Yuan, W. Ni, X. Wang, E. Hossain, and H. Vincent Poor, “Differentially private wireless federated learning with integrated sensing and communication,” IEEE Transactions on Wireless Communications, pp. 1–1, 2025.
[217]
W. Ouyang, Q. Liu, J. Mu, A. AI-Dulaimi, X. Jing, and Q. Liu, “Communication-efficient federated learning for large-scale multiagent systems in ISAC: Data augmentation with reinforcement learning,” IEEE Systems Journal, vol. 18, no. 4, pp. 1893–1904, Dec 2024.
[218]
X. Liu, H. Zhang, C. Ren, H. Li, C. Sun, and V. C. M. Leung, “Multi-task learning resource allocation in federated integrated sensing and communication networks,” IEEE Transactions on Wireless Communications, vol. 23, no. 9, pp. 11 612–11 623, Sep. 2024.
[219]
X. Luo, H.-H. Chen, and Q. Guo, “Semantic communications: Overview, open issues, and future research directions,” IEEE Wireless Communications, vol. 29, no. 1, pp. 210–219, February 2022.
[220]
F. Jiang, Y. Peng, L. Dong, K. Wang, K. Yang, C. Pan, and X. You, “Large AI model-based semantic communications,” IEEE Wireless Communications, vol. 31, no. 3, pp. 68–75, June 2024.
[221]
Y. E. Sagduyu, T. Erpek, A. Yener, and S. Ulukus, “Will 6G be semantic communications? opportunities and challenges from task oriented and secure communications to integrated sensing,” IEEE Network, pp. 1–1, 2024.
[222]
Y. Zhang, Z. Gao, J. Zhao, Z. He, Y. Zhang, C. Lu, and P. Xiao, AI empowered channel semantic acquisition for 6G integrated sensing and communication networks,” IEEE Network, vol. 38, no. 2, pp. 45–53, March 2024.
[223]
G. Zhu, Y. Liu, S. Li, K. Mao, Q. Zhu, C. Briso-Rodríguez, J. Liang, and X. Ye, “Semantic-based channel state information feedback for AAV-assisted ISAC systems,” IEEE Internet of Things Journal, vol. 12, no. 5, pp. 4981–4991, March 2025.
[224]
Y. Lu, W. Mao, H. Du, O. A. Dobre, D. Niyato, and Z. Ding, “Semantic-aware vision-assisted integrated sensing and communication: Architecture and resource allocation,” IEEE Wireless Communications, vol. 31, no. 3, pp. 302–308, June 2024.
[225]
G. Li, S. Wang, J. Li, R. Wang, F. Liu, X. Peng, T. X. Han, and C. Xu, “Integrated sensing and communication from learning perspective: An SDP3 approach,” IEEE Internet of Things Journal, pp. 1–1, 2023.
[226]
Y. Zhou, L. Liu, H. Zhao, M. López-Benítez, L. Yu, and Y. Yue, “Towards deep radar perception for autonomous driving: Datasets, methods, and challenges,” Sensors, vol. 22, no. 11, May 2022.
[227]
K. S. Zaman, M. B. I. Reaz, S. H. Md Ali, A. A. A. Bakar, and M. E. H. Chowdhury, “Custom hardware architectures for deep learning on portable devices: A review,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 11, pp. 6068–6088, 2022.
[228]
M. R. Al Koutayni, G. Reis, and D. Stricker, DeepEdgeSoC: End-to-end deep learning framework for edge IoT devices,” Internet of Things, vol. 21, p. 100665, 2023.
[229]
H. Mohammadi Makrani, Z. He, S. Rafatirad, and H. Sayadi, “Accelerated machine learning for on-device hardware-assisted cybersecurity in edge platforms,” in 2022 23rd International Symposium on Quality Electronic Design (ISQED), 2022, pp. 77–83.
[230]
A. Gozuoglu, O. Ozgonenel, and C. Gezegin, CNN-LSTM based deep learning application on jetson nano: Estimating electrical energy consumption for future smart homes,” Internet of Things, p. 101148, 2024.
[231]
N. Peters, C. Horne, and M. A. Ritchie, “Arestor: A multi-role rf sensor based on the XilinxRFSoC,” in 2021 18th European Radar Conference (EuRAD).IEEE, 2022, pp. 102–105.
[232]
N. J. Peters, C. P. Horne, A. D. Amiri, P. Beasley, and M. A. Ritchie, “Modular multi-channel RFSoC system expansion and array design,” in 2023 IEEE Radar Conference (RadarConf23).IEEE, 2023, pp. 1–4.
[233]
B. Banerjee, Z. Khan, J. J. Lehtomäki, and M. Juntti, “Deep learning based over-the-air channel estimation using a ZYNQSDR platform,” IEEE Access, vol. 10, pp. 60 610–60 621, 2022.
[234]
H. Chung, H. Park, and S. Kim, “Leveraging deep learning for practical DoA estimation: Experiments with real data collected via USRP,” Sensors, vol. 22, no. 19, p. 7578, 2022.

  1. Department of Electronic and Electrical Engineering, Faculty of Engineering Sciences, University College London, WC1E 7JE, London, United Kingdom.↩︎

  2. Department of Electrical and Electronics Engineering, Faculty of Engineering, Middle East Technical University, 06800, Ankara, Turkey.↩︎

  3. School of Transportation and Civil Engineering, Nantong University, Nantong, JS, 226019, China.↩︎

  4. Department of Electrical and Electronics Engineering, Faculty of Technology, Gazi University, 06560, Ankara, Turkey.↩︎

  5. Note: Some publications are categorized under more than one category in Table 3 since they propose DL-based architectures for multiple functions such as jointly demodulating communication data and sensing processing↩︎

  6. Across this article, beamformer refers to the algorithms that directs the transmitted signals towards specific directions while precoder refers to the algorithms that pre-process the signals before transmission by taking into account channel conditions to communicate with multiple UEs. However, beamformer and precoder terms are often used interchangeably in the literature.↩︎

  7. It is worth noting that there exist more architectures that are not mentioned here since they may be used for more specific problems outside the scope of this article.↩︎