SemanticCommunication/paper3.txt

2873 lines
174 KiB
Plaintext
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026 2965
Resource Allocation in Wireless Semantic
Communications: A Comprehensive Survey
Chujun Zhang , Linyu Huang , Member, IEEE, and Qian Ning
Abstract—Withtheadventofsixth-generationmobilecommu- Metaverse require wireless communication networks to trans-
nicationtechnology(6G)andtheemergenceoffutureapplication mit huge amounts of data. Wireless communication networks
scenarios such as Metaverse and digital twin (DT), the exist-
mustachieveanextremelylowtransmissiondelayinscenarios
ing traditional wireless communication technology based on
such as autonomous driving and telemedicine. The emergence
Shannons information theory has not been able to meet the
increasing demand for data transmission. Semantic commu- of these applications presents new challenges to traditional
nications (SemCom), which greatly reduces the amount of communication systems.
information transmitted and alleviates the burden of communi- In the face of such a large communication load, how
cation by transmitting the meaning behind the information, has
can one go beyond Shannons limit to the future? Inspired
been considered a promising 6G enabler. SemComs resource
by the three levels of the previous communication problem,
allocation is critical to the systems reliability and effectiveness.
Compared to traditional wireless communication systems, the a new communication paradigm, semantic communication
system architecture and performance metrics of SemCom have (SemCom) [2], [3], [4], has been proposed to shift the com-
undergone significant changes, making it difficult for traditional munication paradigm to the semantic and effectiveness levels.
resource allocation strategies to adapt well to this new architec-
In traditional communication systems, data is compressed
ture. However, the issue remains unresolved and inadequately
bythesourceencoder,andredundancyisaddedtothechannel
researched.Inordertoprovideresearcherswithvaluableinsight
to promote follow-up research, this paper reviews the latest encoder to improve its robustness to interference/noise in the
research results in recent years and presents an overview of channel. At the destination, a reverse process is performed to
research progress in the field of resource allocation in wireless recover the original sent data. The transmission and reception
SemCom.
of signals do not involve any intelligence and the semantic
Index Terms—Performance metrics, resource allocation, information is omitted [5].
semantic communications, semantic similarity. However, in a SemCom system, the semantic source and
destination are intelligent agents that can perform various
highly intelligent algorithms. Semantic coding replaces tradi-
I. INTRODUCTION tional source coding through deep learning (DL) and other
A. Context technologies to extract semantic information. Unlike tra-
ditional communication systems, which are easily affected
IN1949,WeaverexpandedShannonstheorytothreelevels:
by channel conditions, SemCom performs well, especially
technical level, semantic level, and effectiveness level [1].
at low signal-to-noise ratios (SNR), because only semantic
The lowest level is the technical level, which is mainly
information is transmitted. Goal-oriented SemCom or task-
responsible for the accurate and effective transmission of
oriented SemCom is a subset of SemCom that pays more
information symbols; the middle level is the semantic level,
attention to the effectiveness level. Specifically, it focuses on
which points to the transmission of information symbols to
the efficient use of semantic information for the successful
convey the desired meaning; the upper level is the effective-
execution of tasks at a suitable time [6]. The receiver in a
ness level, which aims at effectively performing intelligent
goal-oriented SemCom is interested in the significance and
tasks and providing the needed communication efficiency on
effectiveness (semantics) of the transported source message
the lower two levels. Traditional communications operate at
to achieve a certain task or goal [7]. In summary, SemCom
the technical level, focusing on accurate bit transmission.
is becoming an excellent solution to the above questions.
However, they transmit all information, including useless and
SemCom is also regarded as a key enabling technology for
irrelevant data, to the receiver, leading to channel resource
6G, and it is an important step towards the future of wireless
waste. As sixth-generation mobile communication technology
communication.
(6G) emerges, scenarios such as Digital Twin (DT) and
Received 25 February 2025; revised 23 April 2025 and 17 June 2025;
accepted 30 July 2025. Date of publication 4 August 2025; date of current B. Resource Allocation
version 2 January 2026. This work was supported by the National Natural
In general, resource allocation refers to a set of method-
ScienceFoundationofChinaunderGrant61801318.(Correspondingauthor:
LinyuHuang.) ologies to achieve goals by efficiently allocating resources
The authors are with the College of Electronics and Information and using resource allocation methods based on resource
Engineering,SichuanUniversity,Chengdu610065,China(e-mail:zhangchu-
availability. The resource allocation problem in wireless com-
jun@stu.scu.edu.cn;lyhuang@scu.edu.cn;ningq@scu.edu.cn).
DigitalObjectIdentifier10.1109/COMST.2025.3595168 munications and SemCom is mapped into a mathematical
1553-877X(cid:2)c 2025IEEE.Allrightsreserved,includingrightsfortextanddatamining,andtrainingofartificialintelligence
andsimilartechnologies. Personaluseispermitted,butrepublication/redistributionrequiresIEEEpermission.
Seehttps://www.ieee.org/publications/rights/index.htmlformoreinformation.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2966 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
clarifying the unique contribution of this work. Table I pro-
vides a comparison between our survey and representative
prior works. Although there are some recent surveys on
resource allocation in other communication scenarios that
provided us with great insights, such as edge comput-
ing [16], fifth-generation mobile communication technology
(5G)-and-beyondmobileedgecomputing(MEC)[17],Internet
of Things (IoT) enabled vehicular edge computing [18],
energy-efficient Orthogonal Frequency Division Multiplexing
(OFDM) enabled networks [19], and ultra-dense networks
(UDNs) [20]. Resource allocation is a critical and under-
explored aspect of SemCom, it significantly differs from
traditional communication systems, as it involves unique
allocatable resources like semantic fidelity and computation
overheadforsemanticprocessing,alongsidetraditionalfactors
such as bandwidth and power. Moreover, SemCom introduces
novel performance metrics that will make the object function
Fig.1. TheintegratedframeworkofresourceallocationinSemCom. more complicated, which we will provide a more explicit
descriptioninSectionIII.Thesedifferenceshighlighttheneed
to focus specifically on resource allocation in SemCom, as
optimization problem by modeling the network structure and
existing surveys tend to overlook the unique challenges and
designing the objective function. In resource allocation, the
optimization strategies required in this domain. By dedicating
available resources for allocation are optimization variables;
our review entirely to this topic, our aim is to fill this
the availability of resources and other inherent conditions are
gap and provide a comprehensive and systematic overview
constraints; the objective function is the function to evaluate
of how resource allocation can be effectively addressed
the system performance of achieving a specific goal; the
within the context of SemCom. Therefore, we review from
resourceallocationalgorithmisacombinationofoptimization
multiple perspectives, including SemCom network models,
techniques that are used to solve this optimization problem.
performance metrics, resource allocation optimization algo-
TheresourceallocationalgorithmsinSemComcanbedivided
rithms, as well as challenges and future research directions,
into centralized and distributed ways. The centralized algo-
providing researchers with a new, comprehensive, and rich
rithm includes techniques based on convex optimization and
perspective.
other mathematical methods, and based on deep reinforce-
ment learning (DRL), etc. The distributed algorithms include
techniques based on multi-agent deep reinforcement learning D. Research Methodology
(MADRL) and matching theory, etc. The integrative frame-
In this subsection, the process followed to collect the
workofresourceallocationinSemComisillustratedinFig. 1.
references used in this study is described. The methodology
However, compared to the traditional wireless communica-
includestheselection,inclusion,andexclusioncriteriaapplied
tionsystem,theSemComsystemarchitectureandperformance
toensurethequalityandrelevanceofthereferences.Thesteps
metrics have undergone tremendous changes, making it diffi-
followed in the research process are as follows:
cult for traditional resource allocation strategies to adapt well
• Literature Search: The search was performed using
to this new architecture. In the next section, we willprovide a
databases such as Google Scholar, IEEE Xplore, and
moredetaileddescriptionofthedifferencebetweentraditional
ScienceDirect. The primary focus was on peer-reviewed
communication and SemCom in terms of resource allocation
journal articles, conference papers, books, and other
and why it is important.
reputablesourcesrelatedtoSemCom,resourceallocation,
optimization, and wireless communication networks.
C. Related Surveys and Motivation • InclusionCriteria:Tobeincludedinthestudy,references
The development of SemCom has led to the publication must meet the following criteria: 1) Published in a peer-
of numerous surveys in recent years. Existing surveys on reviewed journal or conference proceedings. Directly
SemCom may address resource allocation to some extent, related to resource allocation in SemCom networks
they mostly provide a global perspective of SemCom and or relevant areas such as optimization, deep learning
often focus on broader aspects such as system architectures, techniques, and wireless communications. 2) Except
semantic information theory, enable techniques or general for some classic and fundamental literature, references
applications of SemCom [3], [4], [5], [6], [8], [9], [10], should be published within the last 10 years to ensure
[11], [12], [13], [14], [15]. However, our work is the first to that the research is up-to-date and relevant. 3) For
present a dedicated and in-depth review of resource allocation researchpapers,theoreticalandempiricalstudiesmustbe
in SemCom systems. To highlight this distinction, we have included.
added a comparative table that outlines the resource allo- • Exclusion Criteria: References that met any of the
cation aspects covered (or not) by existing surveys, thereby following conditions were excluded from the review:
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2967
TABLEI
COMPARISONOFEXISTINGSEMCOMSURVEYSANDTHISWORK
1) Studies that were completely not related to SemCom
or resource allocation; 2) Non-peer-reviewed sources or
articleswithoutsufficientmethodologicalrigor.3)Studies
published more than 10 years ago unless they introduced
foundational theories or seminal works that remain rele-
vant to current research.
• Information Extraction and Analysis: After finalizing the
selected references, the key information was extracted
andanalyzedinresourceallocation.Thisincludedunder-
standing the research objectives, methodologies used,
findings, and how each study contributed to advance the
understanding of SemCom resource allocation.
Fig.2. Thedistributionofpaperssurveyedbyyearandsource.
E. Contributions and Organization
This paper reviews the current state of research in the
period2021-2025(February)onresourceallocationinwireless divided into end-to-end (E2E) and multi-user situations.
SemCom.Fig. 2showsthedistributionofthearticlessurveyed We also investigated the use of the next generation of
by year and source. The report encompasses arXiv articles multipleaccess(NGMA)technologiesandhybridseman-
and website articles, while the conference category includes tic/bit communications in SemCom resource allocation.
conference and symposium papers, and the journal category WegivetheoverviewofresourceallocationinSemCom,
includes journal and magazine articles. The contributions of thereby explaining the reason why resource allocation
this paper can be summarized as follows: in SemCom is important for the theoretical perspective
• We first explain the basics of resource allocation in and reality perspective, clarifying the unique specific
SemCom and introduce the network model in the cur- challenges that inherently exist in the resource allocation
rent literature on SemCom resource allocation, which is of SemCom.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2968 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
Fig.3. Roadmapofthesurvey.
• The construction of the objective function is the core of summarize the different centralized and distributed resource
the optimization problem modeling, so we introduce the allocation optimization algorithms in detail. Section VI points
performance metrics in the SemCom resource allocation out the challenges and possible future research directions.
in detail. We mainly summarized the construction meth- Finally, Section VII summarizes this survey. Fig. 3 shows the
ods into two types. One is utilizing traditional resource organization and structure of this survey paper.
allocationperformancemetrics,suchasdelayandenergy
consumption. The other type is based on the semantic
II. BASICSOFRESOURCEALLOCATIONINSEMCOM
similarity, establishing new performance metrics.
ThissectionwillexplainthebasicsoftheSemComresource
• We discuss in detail different optimization algorithms
allocation problem. We provide an overview of SemCom,
in the allocation of SemCom resources, which are
followed by a review of the fundamental network mod-
divided into centralized and distributed algorithms.
els found in various SemCom resource allocation studies.
Centralized algorithms include algorithms based on
Furthermore, we give an explicit contrast between bit-level
convex optimization and other mathematical methods,
and semantic-level modeling in Table III, which provides a
algorithms based on DRL, and heuristic algorithms.
side-by-side comparison between the two paradigms, high-
Distributed algorithms include methods based on
lightingtheirrespectivetargets,metrics,modelingapproaches,
MADRL, matching theory, and auction. These meth-
and optimization goals. Next, we provide an overview of
ods are summarized in three comprehensive tables for
resource allocation in SemCom. Besides, we give the taxon-
comparison.
omy of system framework establishment in Fig. 5. Lastly, we
• Through the analysis presented above, we propose future
summarize the literature in Table IV.
researchdirectionsandseveralchallengestobesolvedin
the field of SemCom resource allocation.
The remainder of this paper is organized as follows. A. Overview of SemCom
Section II introduces the basic architecture of the SemCom Traditional communications aim to reach the technical
resource allocation problem. Section III presents traditional level, which means achieving a high data transmission rate
performancemetrics,thedefinitionofsemanticsimilarity,and and a low symbol error rate. However, the basic idea of
new semantic-based performance metrics. Sections IV and V SemCom is to extract the “meanings” or “features” of the
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2969
Fig.4. Acomparisonbetweenthebasicend-to-endnetworkarchitectureoftraditionalcommunicationandSemCom.
source and “interpret the semantic information” at a des- infer the received information to complete the recovery
tination. Therefore, SemCom surpasses traditional bit-level of the received semantic information.
transmissiontoachievesemantic-leveltransmission,leadingto Currently, most of the research literature is focused on three
significant changes in the design of the network architecture. types of sources: text signal, image signal, and speech signal.
Moreover, thereis very littleliteraturethat points the research
1) Basic End-to-End SemCom: A comparison between the direction to multi-modal tasks [22].
basic end-to-end (E2E) network architecture of traditional Text: Text SemCom systems have been widely stud-
communication and SemCom is shown in Fig. 4. Fig. 4a ied. Various DL techniques are used to represent the
illustrates the typical traditional E2E communication archi- underlying meaning of texts. DL-enabled semantic codecs
tecture, where the source encoder receives the transmitted have been through the early Long Short Term Memory
dataandcompressesitinitially,partiallyeliminatingredundant (LSTM)-based models [23], [24], to todays Transformer-
information through source encoding. The channel encoder basedmodels[25], [26].In2018,Farsadetal.[23]proposeda
adds redundancy in various coding ways to combat noise jointsource-channelcoding(JSCC)schemefortextSemCom,
and attenuation in the channel, thereby enhancing its anti- in which the encoder and decoder are implemented by two
interference capability and error correction ability. At the LSTM networks. Compared to the single source channel
destination, a reverse process is conducted to recover the coding (SSCC) scheme, the DL-based JSCC scheme per-
original sent data. We can see in Fig. 4b that SemCom forms better [23]. In 2021, Xie et al. [25] proposed the
primarily differs from traditional end-to-end architecture in DeepSC framework by fine-tuning the basic structure of
three key ways. Transformer[27].DeepSCcanadapttodifferentchannelenvi-
• SemanticCoding:ASemComsystemextractstheseman- ronments, perform well under low SNR, and have excellent
tic information (features) from the original data through robustness. The author of [28] proposed a semantic extraction
semantic coding enabled by technologies such as DL scheme based on the entity recognition model (NER) and
and then encodes these features for channel coding. Due LSTM that transforms the transmitted sentence into multiple
to the implicit meaning inherent in the message under triplets of semantic importance, and important triplets will be
consideration, the amount of redundant data removed is allocated more transmission resources to improve reliability.
significantly greater than that achieved by source coding. The authors of [29] introduce a life-long model updating
Not like semantic segmentation in computer vision, in approach in which the receiver can learn from previously
SemCom, all communication parties must maintain a received messages and automatically update the rules to
high degree of consistency in semantic expression and reasoningforhiddeninformationwhennewunknownsemantic
understanding, which poses a challenge to semantic entities and relations have been discovered.
compression. Image: The image SemCom system is similar to the text
• Knowledge Base: Another important feature of SemCom SemCom system, and there is much research on it. In con-
is that it is a knowledge-based system [21]. This means trast to text systems, image SemCom systems extract the
that semantic source and semantic purpose can be like original images features (which, in this context, represent
the human brain, through self-learning to establish their the images “meaning”) and extensively utilize convolutional
own background knowledge bases (KBs) to guide the neural networks (CNNs). In addition, in many task-oriented
transmitter to obtain multi-level semantic knowledge SemCom systems (such as image classification tasks), the
descriptionofsourcedata,semanticinference,estimation image does not need to be reconstructed at the receiver. In
of transmission environment, and semantic requirements 2019, Bourtsoulatze et al. [30] first proposed an end-to-end
of downstream tasks. The system performs semantic imagetransmissionsystemusingCNNsJSCCscheme,which
coding and directs the receiver to execute the inverse has better performance than traditional image transmission
process, known as semantic decoding. methods. In 2022, Dong et al. [31] proposed a layer-based
• Semantic Decoding: Based on technologies such as semantic communication system for images (LSCI), and
semantic KBs and DL, the receiver can understand and the concept of semantic slice-models (SeSM) is proposed
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2970 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
to enable flexible model resemblance under the different samples using CNN and the gated recurrent unit (GRU)-
requirementsofthemodelperformance,channelsituation,and based bidirectional RNN (BRNN) modules. In the image
transmissiongoals.In2023,Lokumarambageetal.[32]imple- SemCom systems [30], [31], [32], [33], [39], networks
mented a semantic communication-based end-to-end image such as CNN and GAN are often used, and the input
transmission system, where a pre-trained GAN network is is a n-dimensional image, not a sequence like text or
used at the receiver as the transmission task to reconstruct speech. Simulation results show that SemCom performs
the realistic image based on the semantic segmented image well especially under the low SNR. This is because the
at the receiver input. Kadam and Kim [33] proposed a joint extractedsemanticfeaturesreduceredundancywhichwill
CNN-LSTM-based SemCom model in which the semantic use more channel resources. After semantic extraction,
encoder of a camera extracts the relevant semantics from the high-level semantic representations are less sensitive to
raw images, resulting in a novel approach to the problem of noise, which makes the SemCom system more robust.
predicting vehicle counts. • Knowledge Graph-based semantic extraction: It extracts
Speech: Unlike the previous two modes of the SemCom structured information as semantic triples (subject, pred-
system, the speech signal possesses more complex icate, object) to form a knowledge graph, which
performance characteristics, including speech speed, volume, enhances interpretability and enables reasoning but
tone, and dialect, all of which can express the same meaning. requires high construction and maintenance costs. The
The general approach is to convert the speech into text for semantic information of a knowledge graph is typically
processing. However, the same text information expressed expressed as triples in the form of (head, relation,
in different intonations will produce different meanings. tail). From a piece of text data, multiple triples can be
Therefore, the process of voice semantic transmission is more extracted, and these triples can be used to characterize a
complex and challenging to manage [34], [35]. The majority knowledge graph. The knowledge graph extracted from
of the source modes in SemComs resource allocation are text each sample data Tn is represented as
(cid:4) (cid:5)
and image modes. Currently, there is no relevant research on
the allocation of resources for the SemCom speech system. Gn = ε1 n ,ε2 n ,...,εm n ,...,εM n , (2)
In the following content, we will introduce and compare
these papers comprehensively and organize them in tables for
whereεm
n isthem-thtripleinknowledgegraphGn,M is
reference. the total number of triples. The triple
εm
n can be written
in the following form:
2) Mathematical System Modeling of SemCom: While the
previous section has highlighted the core components of εm n =(hn m,rn m,tn m ), (3)
semanticcommunication,itisequallyimportanttounderstand
how these elements integrate into a mathematical frame- where hn
m
is the head entity of triple
εm
n , tn
m
is the tail
m
work. We will introduce some essential parts of mathematical entity, and rn is the relation of head and tail entities.
modelinginpapers,mainlyonsemanticextractionandseman- For text, the work in [40] used an information extrac-
tic metrics (it will be discussed thoroughly in Section III). tion system to extract semantic triples from texts and
• NN features-based semantic extraction: It utilizes deep modeled as KGs, and the receiver used a graph-to-text
learning models for end-to-end semantic encoding, generative algorithm to recover the original texts based
offering strong contextual understanding but lacking on the received triples. In [41], a cognitive text semantic
interpretability and explicit semantic relationships. In communication framework is proposed by exploiting
such an approach, the encoded symbol stream can be knowledge graph. For image, the scene graph (SG) is
represented by a visual KG that describes visual relationships between
(cid:2) (cid:3) entities,theauthorsin[42]and[43]usedobjectdetection
x=Cα Sβ(s) , (1) and RE algorithms to extract SG from images.
3) Multi-User SemCom and Multiple Access Techniques:
where, Sβ(·) is the semantic encoder network with The previous section introduces several end-to-end SemCom
parameter set β and Cα(·) is the channel encoder with systems.However,alltheabovesystemsdonotinvolvemulti-
parameter set α, the specific networks are various in user transmission. In general, the connection density of 5G is
different systems. In text SemCom systems [25], [36], 106devicespersquarekilometer,whiletheconnectiondensity
networks such as Transformer, BERT, or LSTM are ofthe6Gnetworkwillincreaseto10timesthatof5G,andthe
utilized for semantic extraction, s = [w1 ,w2 ,...,wL] regional traffic density should be 100 times that of 5G, which
denotes the original sentence, wl represents the l- requires a significant improvement of spectral efficiency [5].
th word in each sentence. In speech SemCom Moreover, the knowledge base within the SemCom system
systems [34], [37], [38], ResNet, Transformer, CNN and may vary significantly. Therefore, from a more realistic point
RecurrentNeuralNetwork(RNN)areutilizedforseman- ofview,itisnecessarytodesignamulti-userSemComsystem.
ticextractionindifferentstudies,theinputs isthespeech Notably, we only survey the multi-user SemCom system in
sample sequence, s =[s1 ,s2 ,...,sW] with W samples, papers on resource allocation in SemCom, not all SemCom-
where sw is the w-th item in s and it is a scalar value. related papers.
In the DeepSC-ST system [38], text-related semantic In the resource allocation problem of multi-user SemCom,
features are extracted from the input speech spectrum the classical multiple access (MA) techniques such as
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2971
TABLEII
THECOMPARISONOFDIFFERENTNGMATECHNIQUES
frequency division multiple access (FDMA) [36], [44], [45], via SIC, user-k decodes its desired private stream sk, so the
[46],[47],[48],orthogonalfrequencydivisionmultipleaccess private rate of user k is
(OFDMA) [40], [49], [50], [51], [52], [53], [54], [55], (cid:6) (cid:8) (cid:8)hHp (cid:8) (cid:8)2 (cid:7)
[
(T
56
D
]
M
, [
A
57
)
]
[
,
61
[5
],
8]
[
,
62
[
]
59
te
]
c
,
h
[
n
6
i
0
q
]
ue
o
s
r
a
t
r
i
e
m
m
e
o
d
s
i
t
v
ly
is
u
io
s
n
ed
m
.H
u
o
lt
w
ip
e
l
v
e
er
a
,
c
w
ce
i
s
th
s Rk =Blog2 1+ (cid:8)
(cid:8)h k p
k
j
(cid:8)
(cid:8)2
k
+Nk
, (6)
the continuous development of communication technology,
so that the achievable total rate of user k is
researchers have begun to explore the application of the
combination of next-generation multiple access (NGMA) and Rk,tot =Ck +Rk . (7)
SemCom in resource allocation. Before comparing different
In [64] and [65], the authors used SDMA as the multiple
MA techniques in papers on resource allocation in SemCom,
access method and established an SDMA-based multiuser
wesummarizedthesethreekeyNGMAtechniquesinTable II.
probabilistic SemCom (PSC) framework that considers both
As in Table II, spatial division multiple access (SDMA)
transmission and computational consumption. The authors
treats the interference of other users fully as noise. Non-
of [61] proposed a new semantic-aware resource allocation
orthogonal multiple access (NOMA) will employ successive
scheme in the integration of the radio frequency energy
interference cancellation (SIC) at one user to fully decode the
harvesting (EH), cognitive radio (CR), and NOMA scenario.
interference. Rate splitting multiple access (RSMA), based on
An uplink network consisting of multiple primary users (PU)
theconceptofratesplitting(RS),isconsideredtobeapromis-
using TDMA and a secondary user (SU) using NOMA and
ing physical layer transmission paradigm for non-orthogonal
PUmultiplexingspectrumisconsidered.Inthebackgroundof
transmission, interference management, and multiple access
PSC, the work in [66] studied the joint communication and
strategies in 6G. The main idea of RSMA is to divide
computation design in the reconfigurable intelligent surface
user messages into common and private parts (sc and sk)
(RIS)-assisted industrial Internet of Things (IIoT).
and to be able to partially decode interference and partially
Compared to SDMA and NOMA, the research on resource
treat interference as noise, which is in stark contrast to the
allocation in the combination of RSMA and SemCom is
extreme interference management strategies used in SDMA
obviously more [67], [68], [69], [70], [71], [72]. In [67],
and NOMA. The flexibility of RSMA makes it perform well
the optimization problem of the energy consumption of the
at all levels of interference [63]. In RSMA, pk and pc are
downlink SemCom network with RSMA is studied. The
the power allocated to private messages and the common
authors of [69], [70] focused on the PSC framework based
message. The common stream sc is decoded first by treating
on RSMA; reference [70] expanded the work of [64], and
the interference from private streams s1 and s2 as noise. As
the multiple access mode was changed from uplink SDMA
sc contains part of the intended message as well as part of
to downlink RSMA, while the authors of [69] paid more
the message of the interferer, it enables the ability to partially
attention to the energy-saving design of the PSC system.
decode interference and partially treat interference as noise.
The simulations of the above literature [68], [70] compare
The instantaneous rates for decoding the common streams at
the SDMA and NOMA-based schemes. The results show
user-k are
(cid:6) (cid:7) that the RSMAbasedschemeperformanceisthebestinterms
|h p |2
Rc,k =Blog2 1+
|h k p 1 |2 +
k
|h k
c
p 2 |2 +Nk
. (4) of
4
to
)
ta
H
l
y
s
b
e
r
m
id
anti
S
c
em
tra
a
n
n
s
t
m
ic-
is
B
s
i
i
t
on
C
ra
o
t
m
e.
munication: While most
research on resource allocation focuses solely on SemCom
To guarantee that common message sc is decoded by both
itself, the coexistence of SemCom and bit communication
users, the common rate shall not exceed
(BitCom) modes has also received attention [44], [45], [73],
Rc =min{Rc,1 ,Rc,2 }. (5) [74], [75], [76], [77], [78]. SemCom is more suitable for low
signal-to-interference-plus-noise ratio (SINR) and resource-
Denote Ck as the common rate portion of user-k: C1+C2 = constrained scenarios, while BitCom performs well in high
Rc .Oncesc isdecodedandremovedfromthereceivedsignal SINR regions. Moreover, it is not possible to completely
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2972 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEIII
COMPARISONOFMODELINGANDFRAMEWORKS:TRADITIONALVS.SEMANTICCOMMUNICATION
replace BitComs current huge infrastructure and user bases (suts/s, which will be discussed in the next section), which
at once. In the future, hybrid semantic/bit communication is unified into the semantic correlation measure to measure
networks will become an inevitable and persistent example of the network performance. Compared with the combination
intermediate networks [78]. The authors of [73] proposed a mode of SemCom and BitCom in [75], [78], the works
novel multi-carrier E2E system that combines both semantic in[44], [45], [74]bothstudiedanotherformofcoexistenceof
and Shannon (bit) communications, in which both the BS and SemCom and BitCom separately in the downlink and uplink
theusercancommunicatebychoosingtoutilizeeitherbitCom transmission. A semantic relay (SemRelay)-aided system was
or SemCom on each subcarrier. For resource allocation in proposed. We use the uplink transmission scenario in [74] for
the coexistence of semantic and bit communication networks, explanation: from the users to SemRelay using BitCom, from
the focus is how to combine the measurement of the two. SemRelay to the BS using SemCom. In the User-SemRelay
us
In [78], a bit-to-message (B2M) conversion function is used link, FDMA is adopted, the achievable rate Rn is:
to convert the rate metric into the capacity of the semantic (cid:6) (cid:7)
c
p
h
e
a
r
n
u
n
n
e
i
l
t
(
t
i
i
.
m
e.
e
,
,
th
m
e
s
a
g
c
/
h
s)
i
,
ev
le
a
t
bl
R
e
i
m
j(
e
·
s
)
sa
d
g
e
e
no
ra
te
te
th
in
e
u
B
n
2
it
M
so
f
f
u
m
nc
e
t
s
io
sa
n
g
o
es
f
Rn us =Bn us log2 1+ |h
B
n u
n u
s
s
|2
N
p
0
n u , (11)
the SemCom link between mobile user (MU) i and BS j, its
instantaneous achievable message rate in time slot t should be where N0 is the power spectral density of the additive white
Mi S j(t)=β ij(t)R ij (cid:2) bij log2(1+γ ij(t)) (cid:3) . (8) G of au u s s s e ia r n n n , o h is n u e s (A d W en G ot N es ), t p h n u e d c e h n a o n t n e e s l th g e ai t n ran f s ro m m iss u io s n er po n we to r
us
Here, β ij(t), bij(t), and γ ij(t) represents the knowledge- SemRelay and Bn denotes the bandwidth allocated to the
matching degree, bandwidth, and SINR between MU i and its link. The transmission delay for each user n is given by
communicationcounterpartatslott.ComparedtotheSemCom tn us = R D u n s . Here, Dn is the volume of text data in bits. The
n
link,theinstantaneous achievable messagerateoftheBitCom computation time cost for semantic compression at SemRelay
c
link in slot t is given by is t , The achievable rate of the SemRelay-BS link is:
(cid:2) (cid:3) (cid:6) (cid:7)
Here, bij(t
M
),
i B j
an
(t
d
)
γ
=
ij(
ρ
t
ij
)
R
de
ij
no
b
t
i
e
j
s
lo
th
g
e
2(
s
1
am
+
e
γ
t
i
h
j(
in
t)
g
)
a
.
s in Eq. (
(
8
9
)
)
,
R sb =B sb log2 1+ |h
B
s
s
b
b
|
N
2 p
0
s , (12)
and ρ ij is an average B2M transformation ratio to measure
s sb
network performance with a message-related metric unified where, pn denotes the transmission power of SemRelay, hn
sb
with SemCom. denotes the channel gain from SemRelay to BS, and Bn
IftakingbothSemComandBitComintoaccount,useyij to denotes the bandwidth allocated to the link. The transmission
denote the communication mode selection (yij = 1 represents delay for SemRelay is given by t
sb
=
D
R
S
s
e
b
m.
Here, D
Sem
that the SemCom mode is selected for the link between MU is the total number of bits for the compressed semantic
c Sem
i and BS j, and yij = 0 indicates that the BitCom mode is information. The explicit expression of t and D can be
all
selected), the time-averaged message rate of each link is found in [74]. So the overall latency t is
Mij = 1 (cid:9)N (cid:10) yijMi S j(t)+ (cid:2) 1yij (cid:3) Mi B j (t) (cid:11) . (10) t all =max{tn us,∀n}+t c +t sb. (13)
N
t=1 Another difference from [75], [78] is that [44] and [45]
In [75], the equivalent transformation method in [36] is transformthesemanticrateintothebitratetounifythesetwo
usedtotransformthebitrateintotheequivalentsemanticrate rate metrics into a bit-based metric (bit/s).
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2973
B. Overview of Resource Allocation in SemCom • Reality perspective: In the context of 6G, the amount of
data generated by terminal devices around the world is
We have given a brief description of resource allocation in
explosively increasing. Coordinating limited resources to
SectionI.Wearenowgivingamoredetaileddescriptionofthe
betterprocessthesedatarequiresanappropriateresource
differencebetweentraditionalcommunicationandSemComin
allocation strategy. Data from different application sce-
terms of resource allocation, as well as why it is important.
narios may have different service requirements. Vehicles
1) The Difference With Traditional Communications:
in autonomous driving scenarios need to process data
• Optimization Problem: Compared with traditional wire-
in milliseconds to ensure traffic safety. Therefore, ultra-
lesscommunication,SemComsnetworkarchitecturehas
low latency is its main goal. Semantic sensing systems
changed in many aspects, from codec level to multiple
assisted by uncrewed aerial vehicles (UAVs) usually
access modes. Due to the inexplicability of neural
pay more attention to the long battery life and expect
networks, it is difficult to derive closed-form expressions
to achieve low energy consumption. In addition, some
of some objective functions or variables. Therefore, the
mobile devices and IoT devices are designed to achieve
constructed optimization problem, from the objective to
lowdataprocessingcostsorachievethebestusersatisfac-
the constraints and optimization variables, differs signif-
tion. Therefore, appropriate resource allocation strategies
icantly from the traditional architecture.
are needed to meet these diverse needs.
• Optimization Algorithm: As artificial intelligence and
machine learning technology continue to advance, an
3) Specific Challenges of Resource Allocation in SemCom:
increasing number of intelligent methods have emerged
SemCom brings fundamental shifts to the modeling, evalu-
to address resource allocation problems. For exam-
ation, and optimization of wireless communication systems.
ple, neural networks are used to approximate the
These shifts give rise to several unique challenges that are
function in which closed-form expressions cannot be
rare or nonexistent in traditional communications and funda-
obtained,anddeepreinforcementlearning(DRL)hasalso
mentally affect how resource allocation must be performed.
become a powerful tool for solving complex resource
Although Section VI will discuss open research problems
allocation problems in recent years [79], [80], [81].
and promising future directions for SemCom, this subsec-
Though traditional methods like mathematical and con-
tion focuses on the specific and practical challenges that
vex optimization-based algorithms are still widely used,
currentlyariseinexistingSemComsystemdesignsandimple-
resource allocation in SemCom is more applicable
mentations. These challenges reflect the inherent complexity
to intelligent methods, and many papers tend to use
and unique characteristics of SemCom. By clarifying these
intelligentmethod-basedalgorithms.Wewillgiveacom-
concrete issues, we lay the foundation for understanding
prehensiveintroductiontothesealgorithmsinSectionIV.
why the optimization techniques in SemCom (which will be
2) The Reason Why Resource Allocation in SemCom is introducedinSectionsIVandV)arenecessary.Thesespecific
Important: challenges can be summarized as follows:
• Theoretical perspective: Firstly, from the perspective of • Tradeoff Caused by Semantic Compression Ratio:
thenetworkmodel,SemComhasalotofnewmodulesto There are many tradeoffs, such as the energy-latency
consider,suchasthesemanticencoderandtheknowledge tradeoff and the accuracy-efficiency tradeoff, that
base.MostSemComsystemsuseDLtechniquestoadopt already exist in traditional communications. However,
semantic extraction. Neural networks will bring about a SemCom introduces the new resource type, the seman-
lotofinexplicabilityandcanresultinthelackofaclosed tic compression/extraction ratio, which directly affects
form of part of the objective function. Moreover, as it communication, computation, and semantic fidelity. For
involves unique allocatable resources such as semantic instance, a higher compression ratio reduces the data
fidelity and computation overhead for semantic pro- size for transmission and saves transmission delay and
cessing. Optimization algorithms to optimize these new energyconsumption(communicationloadreduction),but
semantic-related variables directly have a great influence it lowers the semantic fidelity and task accuracy and
on the whole system performance. Besides, traditional needs more computing resources to process the seman-
performance metrics do not consider the meaning of tic extraction and recover, which results in the local
information. Using traditional performance metrics for extraction latency and energy consumption at the trans-
resource allocation may even lead to a decrease in mitter, the recover latency and energy consumption
system performance. Therefore, developing new metrics at the receiver (computation load increase). Moreover,
that match the characteristics of SemCom and designing for intelligent tasks, a higher compression ratio (lower
proper optimization algorithms to deal with the new in value) results in higher computing cycles for task
objective functions and constraints caused by these new processing, thus increasing task computing latency and
metrics can also have a positive influence on system energy consumption. These tightly coupled tradeoffs of
performance. Recently, there has been a lot of research computing, communication, and accuracy make resource
on the new performance metrics of SemCom, such as allocation in SemCom inherently more complex. The
semantic similarity, semantic energy efficiency, and task detailed description about how the semantic compression
successrate,ofwhichwewillgiveadetaileddescription ratio influences latency and energy consumption is in
in Section III-C. Section III-A.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2974 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
• Optimization with Non-differentiable and Implicit
Objectives: Many SemCom key performance metrics
rely on semantic similarity, which is difficult to express
analytically. These objectives often lack closed-form
expressions, are non-differentiable, or even implicitly
defined through closed-box models, which make
traditional optimization methods hard to apply well.
• Highly Coupled and Non-convex Optimization Variables:
Unlikeconventionalsystemswhereresourcevariablescan
often be decomposed or linearized, SemCom involves
complexcouplingbetweenvariablessuchascomputation
capacity, transmission power, and semantic compression
ratio. The resulting optimization problems are typi-
cally non-convex and nonlinear, in both objectives and
constraints.
• Task-related Semantic Information Transmission in Task-
oriented SemCom: In task-oriented SemCom systems,
the resource allocation is closely tied to the task-related
importance of the semantic information. For example,
tasks involving safety-critical or context-rich data trans-
mission (e.g., autonomous driving) may need to acquire Fig.5. Thetaxonomyofsystemframeworkestablishment.
high semantic fidelity, while other types of tasks may
tolerate coarse-grained transmission. This task depen-
dence necessitates adaptive resource allocation schemes to SemCom, followed by an examination of key network
thatalignwithtask-relatedsemanticinformationandtheir modelsusedinSemComresourceallocation.Wethendiveinto
utility, to complete the transmission of task-related and the core aspects of resource allocation within SemCom and
high semantic-importance features. At the same time, conclude with a preliminary review of the relevant literature,
it ensures the allocation of other resources (bandwidth, summarized in Table IV, which gives a preliminary summary
power, computing resources) to jointly optimize the of the literature on resource allocation in SemCom based on
overall system performance. source modal, communication mode, multiple access mode,
These challenges motivate the development of novel and resource allocation type. In the table, one(many)-to-many
optimization formulations and solution algorithms, as will be means one(many) BS(s)/edge server(s) to many users/end
discussed in the following sections. devices(EDs).Furthermore,weusethesymbol“”toindicate
4) ResourcetoBeAllocatedinSemCom: Generallyspeak- that this property is not presented in the paper.
ing,thecurrentresearchonresourceallocationmainlyinvolves
computing, communication, and storage resources, with the
following resources typically requiring allocation.
III. PERFORMANCEMETRICSOFRESOURCEALLOCATION
• Computing resources: The computing frequency of Building upon the previous section, this section will review
CPUs/GPUs on the BS or user side, also known as the research on performance metrics in SemCom and the
computing capacity. formation of optimization objectives in different literature.
• Communication resources: The wireless resources used Usually, we evaluate a communication system based on
by BS or clients for data transmission, including band- its accuracy and effectiveness. The traditional communica-
width, power, etc. tion method is measured by the bit error rate and the bit
• Network parameter resources: The network-parameter transmission rate. For SemCom, accuracy can be measured
resources are the parameter settings in the SemCom by task performance and quantified by semantic similarity of
system, including the semantic compression ratio, the text transmission, character error rate of speech recognition,
neural network parameters, and other parameters or pol- etc. However, the efficiency of SemCom is usually difficult
icy settings. to measure and quantify [121]. As a result, it is critical
• Storageresources:EdgeserversorBSusethesehardware and challenging to establish new performance metrics for
storage resources to cache computing tasks and popular SemCom resource allocation. At present, the research of
content (such as road monitoring). SemCom resource allocation on constructing optimization
Inthispaper,wesummarizetheresourcestobeallocatedinthe objectives is mainly divided into two methods: based on
literature in Tables IX, XI, and XIII, and we need to mention traditional resource allocation performance metrics such as
thatthestorageresourcesareomittedsinceonlyonework[82] energy consumption, delay, and utility; and establishing new
considered them. The symbol “–” in the tables indicates that semantic-related performance metrics. See below for details.
this particular resource type is not allocated. Indifferentarticles,thesymbolsforthesamevariablesmay
In this section, we outline the foundational structure of the be inconsistent. To improve the readers understanding of the
SemCom resource allocation. It begins with an introduction compositionoftheseperformancemetrics,thispapermodifies
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2975
TABLEIV
COMPARISONOFPAPERSFOCUSINGONDIFFERENTSOURCEMODAL,COMMUNICATIONMODES,ANDSCENARIOS
theexpressionsinsomeliteratureandunifiesthemathematical cell, etc. At this time, we follow the expressions in their work
expressions of common variables in different literature, as and provide additional descriptions.
shown in Table V.
In most of the literature, for the subscript of a single
A. Traditional Performance Metrics in Resource Allocation
variable, we use n to represent the n-th user, m to represent
them-thsubchannel,btorepresenttheindexofBS,xn,m =1 1) Energy Consumption and Time Delay: Energy con-
to represent the association of user n and subchannel m, and sumption and delay/latency are two of the most traditional
xn,m =0torepresentdisassociation.Insomeotherreferences, and commonly used performance metrics in resource
the subscript may refer to a task, a user group in a cellular allocation.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2976 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEIV
(Continued.)COMPARISONOFPAPERSFOCUSINGONDIFFERENTSOURCEMODAL,COMMUNICATIONMODES,ANDSCENARIOS
VARIABL
T
E
A
S
B
D
LE
ES
V
CRIPTION
ρ is the compression ratio, fe is the computing capacity at
thetransmitter,andF(ρ,D) istherequiredcompressionCPU
cycles, which might be different across the literature. For
instance, [60] modeled F(ρ,D) as
αD
F(ρ,D)= , (15)
ρβ
where α > 0, β > 0 are constants relevant to the tasks.
Transmission latency is
T 2 =
ρD
, (16)
R
R is the transmission rate. Computing latency is
T 3 =
ρwDG
, (17)
fr
wherew istherequiredCPUcyclesperbittoprocessthetask,
For applications sensitive to delay, the design of a resource
fr is the allocated computing capacity at the receiver. We use
G todenotetheratioofcomputationintensityofsemanticdata
allocation algorithm to reduce latency is one of the main
to that of raw data. The increase is caused by computations
concerns [42], [58], [60], [73]. Delay modeling generally
forprocessingsemanticdataandcompensationsforenhancing
includes the following parts: a) semantic extraction latency
1 2 accuracy [59]. G can be denoted as
at the transmitter (T ); b) transmission latency (T ); and
c) semantic recovery latency or task process latency at the 1
receiver (T 3 ). G = ρc , (18)
We previously mentioned in Section I-B3) that the
where c is a constant related to specific tasks. Fig. 6 shows
influence of the semantic compression ratio is the computing- the relation of compress ratio and G, where ρ min is the
transmission tradeoff in latency. For better understanding, we
minimum compression ratio to maintain the integrity of
simply model the latency of a single user in the semantic-
source information or task, which can vary from different
aware task process scenario, compression latency is
tasks/users/information modalities.
So the total latency is
T 1 =
F(ρ,D)
, (14) T =T 1 +T 2 +T 3 =
F(ρ,D)
+
αD
+
ρwDG
. (19)
fe fe ρβ fr
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2977
2
E )needstobeconsideredasaconstraintsincetheusersides
(like mobile devices) often have energy budgets. However,
there are some other scenarios like energy minimization
of energy efficient communication system, which needs to
consider the total energy consumption of both transmitter and
1 2 3
receiver (E +E +E ).
To better show the relations of compression ratio and
latency/energy consumption, we illustrate them in Fig. 7a
and Fig. 7b, where
ρ
t is the optimal compression ratio for
the minimum latency of single user and
ρ
e is the optimal
compression ratio for the minimum energy consumption of
single user. In the figures, the range of compression ratio ρ is
in[ρ min ,1]duetotheρbelowthresholdρ mincannotmaintain
theintegrityofsourceinformationortask.ρ min canvaryfrom
different tasks/users/information modalities, here we set it to
0.5 for illustration,
In Fig. 7a and Fig. 7b, we can notice that the transmission
Fig.6. TherelationofG andcompressionratioρ. delay/energy decreases with decreasing compression ratio,
the computation delay/energy increases with the decrease
of compression ratio, and the optimal compression ratio to
It is obvious that compression ratio affect all parts of the total
reach the minimum value of latency and energy consumption
1
latency,andcontrolsthetradeoffbetweencomputing(T and
is different, thus leading to a tradeoff in computing and
3 2
T ) and transmission (T ).
transmission.(Note:Thisrelationmayvaryindifferentsystem
Whenthefocusofthearticleison“EnergyEfficiency”,the
models and with different users. The relation in Fig. 7 is an
totalenergyconsumptionoftheentiresystemisoftenusedasa
example illustration of a certain user.)
performance metric [50], [59], [62], [67], [87], [114]. In most
2) Utility Function: The concept of utility in resource
cases, delay and energy consumption are contradictory. The
allocation refers mainly to the satisfaction of users under
otheroftenbecomesaconstraintwhenoneistheoptimization
a certain resource allocation scheme. Utility is generally
goal. In [50], the authors proposed a semantic-aware energy-
expressed by the utility function. According to various objec-
saving task offloading network model. The goal is to extend
tives, the utility function is represented and mathematically
thebatterylifeoflocalusers,sothesumoflocalusersenergy
transformedbydifferentqualityofserviceparameters,suchas
consumption is used as the objective function. Considering
data transmission rate, delay, energy consumption, and cost,
the power shortage of mobile devices, the study in [59] is
which can achieve a better overall effect. The mathematical
committed to the allocation of resources for semantic-aware
transformation mainly includes reciprocal, logarithmic, and
MEC systems to minimize energy consumption. As discussed
weighted summation. Finally, an effective optimization algo-
in [67], the authors modeled the delay and total energy
rithm is designed to maximize the utility [46], [48], [49],
consumptionofasingleuserthatconsistsofthesethreeparts.
[117], [118]. For example, the utility function established in
The goal is to minimize the total energy consumption of the
the literature [117] is shown in Eq. (23):
entire system, considering constraints such as delay.
We also previously mentioned in Section I-B3) that the U =β 1Aβ 2T −β 3E, (23)
influence of the semantic compression ratio is the computing-
whereAisthetotaltaskaccuracy,T isthetotaltimedelay,E
transmission tradeoff in energy consumption. Similarly, we
is the total energy consumption, and β 1 ,β 2 ,β 3 are the weight
also simply model the energy consumption in the semantic-
factors.
aware task process scenario. The energy consumption of
3) Traditional QoS and QoE:
semantic compression can be denoted as
• Quality of Service (QoS): Defined by the International
E 1 =κF(ρ,D)fe 2, (20) Telecommunication Union (ITU) as “the totality of char-
acteristicsofatelecommunicationsservicethatbearonits
where κ is a constant coefficient. F(ρ,D) also denotes the
abilitytosatisfythestatedandimpliedneedsoftheuser.”
CPU cycles required to compress the data D to ρD. The
It primarily focuses on system performance measured
transmission energy is
through physical parameters [133].
E 2 =pT 2 =p
ρD
, (21) • Quality of Experience (QoE): Refers to users subjective
R perception of the system or service performance, influ-
where p is the transmission power. And the task computing enced by context, culture, expectations, psychological
energy can be denoted as factors, and more [133].
E 3 =κ(ρwDG)fr 2. (22) In resource allocation for wireless communications, QoS
modeling is often similar to the utility function, but the
In many one-to-many uplink wireless communication scenar- mathematical complexity is higher than the general utility
t 1
ios, only the transmitters energy consumption (E = E + function.In[47],theQoSmodelingbasedonthetransmission
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2978 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
Fig.7. Latencyandenergyconsumptionversussemanticcompressionratio.
delay and the number of received semantic information is manualsupervisionanddatareconstruction,suchastextsenti-
shown in Eq. (24). ment classification, image classification, and target detection,
semantic fidelity can be expressed as average classification
QoSm,n(t)=
accuracyordetectionaccuracy.Theestablishmentofmostnew
1
(cid:10) (cid:11)(cid:10) (cid:11), performance metrics for SemCom resource allocation must
1+e β T (Tm,n(t)T th ) 1+e β H Am(t)(H th H˜ m,n(t)) rely on the concept of semantic similarity, so this section will
detail the current definition of various types of semantic
(24)
similarity. The comparison of different types of semantic
The two terms on the right side of the equation repre- similarities is presented in Table VI.
sent the transmission delay score and the received semantic 1) Semantic Similarity of Text Signal: For text transmis-
information score of the user n, respectively, where Tth and sion, BER does not reflect the performance well. In machine
Hth are the transmission delay thresholds and the received translation,bilingualevaluationunderstudy(BLEU)scoresare
semantic information and β T ,β H are the weight factors of generally used to measure results [136]. However, the BLEU
the delay in time and the received semantic information. score can only compare the differences between words in
The primary goal of wireless communication network twosentences,butcannotcomparetheirsemanticinformation.
services is to provide a user-satisfied quality of experience BLEU outputs a number between 0 and 1, representing the
(QoE) that is more user-centric. QoS does not contain any similaritybetweentwosentences,with1representingthehigh-
human-related quality factors, which means that for two estsimilarity.However,worderrorsmaynotalterthemeaning
different users, the same level of QoS may not guarantee of sentences. For example, the two sentences “That car had
the same level of QoE [134]. Designing QoE and managing been deserted” and “That vehicle had been abandoned” have
it while providing a service is necessary for high-quality the same meaning, but their BLEU scores are different due to
experiences. This requires assessment methodologies that can the use of different words to represent “car” and “deserted”,
quantifyQoE[135].Reference[71]studiedthetransmissionof which is a flaw in BLEUs recognition of synonyms. A
imagesemanticinformationintheMetaverse3Dconstruction. word can have different meanings in different contexts. For
Data rate, bit error rate (BER) and interest score (the degree example,“bus”canhavedifferentmeaningsintermsofpublic
of interest in the image after semantic segmentation, which transportationandamicrocomputer.Traditionalmethods,such
is related to people) are considered when modeling QoE. In asword2vec[137],cannotrecognizeapolysemy.Theproblem
SectionIII-Cofthispaper,theQoEinthecontextofMetaverse is how to represent the word with a numerical vector, which
and SemCom is introduced. is different in different contexts [25].
Therefore, based on the bidirectional encoder representa-
B. Semantic Similarity tion from transformers (BERT) model [138], Reference [25]
Semantic similarity is defined as the degree of similarity proposed a new metric, Sentence Similarity, which describes
between the sender and the receivers semantic information the similarity of two sentences according to their semantic
under a specific semantic task. For task-oriented SemCom, information, as shown in Eq. (25).
semantic similarity can be extended to semantic fidelity.
The specific representation of semantic fidelity varies with
ξ =
BΦ(s)·BΦ(ˆs) T
, (25)
different target tasks. For automated tasks that do not require (cid:3)BΦ(s)(cid:3)(cid:3)BΦ(ˆs)(cid:3)
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2979
TABLEVI
COMPARISONBETWEENDIFFERENTSEMANTICSIMILARITIES
whereBΦ representstheBERTmodel.Thesentencesimilarity semantic information in the image is extracted into a scene
defined in Eq. (25) is a number between 0 and 1, which graph (SG) in the form of text, which captures the objects
representsthesimilaritybetweenthedecodedsentenceandthe andtheirrelationshipsintheoriginalimage.Thisinterpretable
transmitted sentence; 1 represents the highest similarity, and semantic information can not only be directly read and
0 represents no similarity. understood by humans but also be used to generate original
Currently, to measure text semantic similarity, most of images and retrieve similar images.
the literature [36], [52], [53], [55], [89], [90], [101] uses [42] introduced a comprehensive image-to-graph semantic
sentence similarity based on the BERT model as semantic similarity (ISS) metric, which uses a pre-trained deep neural
similarity. However, the authors of [40] proposed a metric of network (DNN) to directly capture the correlation between
semantic similarity (MSS), which is a function of semantic the original image and its semantic information without
accuracy and completeness. Based on token matching [139], any reconstruction of the image. The DNN is trained by
semantic accuracy is defined as the ratio of the sum of the Webimagetext [140],adatasetof400millionimage-textpairs
correct occurrences of each token in the recovered text to the collected from the Internet. Compared with the structural
sum of the occurrences of each token in the recovered text. similarity index measure (SSIM) [141], which measures the
Semantic completeness is defined as the ratio of the sum of difference between the original image and the reconstructed
the correct occurrences of each token in the recovered text to image on a set of pixels, the DNN can be used directly to
the sum of the occurrences of each token in the original text. obtaintheimagevectorandthesemanticinformationvectorof
Due to the high complexity of the expressions, we omit the thereceivedSG.TheISSmetricisdefinedasthecosineofthe
explicitexpressionofMSS.Reference[40]includesadetailed angle between the image vector and its normalized semantic
description of these metrics. triplet vector, which is calculated by the projection of the
2) Image-to-Graph Semantic Similarity: Although most of image vector on the set of semantic information vectors. The
the current work in the resource allocation of SemCom specific calculation steps and formulas are detailed in [42].
is text and image modalities, the work of [58] and [42] 3) SemanticSimilarityofImageSignal: Thesemanticsim-
combines the two in semantic extraction and establishes an ilarity of the image signal is used to measure the similarity
image-to-text semantic information extraction method. The between the original image and the restored image. The
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2980 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEVII
MAPPINGBETWEENRESOURCETYPESANDSEMANTICPERFORMANCEMETRICS
more classical method is measured by the peak signal-to- C. New Performance Metrics for SemCom
noise ratio (PSNR), which is based on the errors between
As mentioned above, the traditional resource allocation
corresponding pixel points. In the previous section, SSIM
model is usually modeled based on Shannon capacity,
is mentioned. It is widely used in the application of image
which fails to give full play to the performance advan-
similarity measurement, including the resource allocation of
tages of SemCom to ensure the best performance of the
SemCom [47]. These two metrics are used mainly in the
SemCom network. SemCom does not require error-free trans-
imagesignalsimilarityevaluation.However,in[113],ametric
mission of bits or symbols, so the optimization problem
for image semantic transmission (MIST) is proposed, which
based on Shannon capacity construction may reduce system
combinestheimportanceweightofeachsemanticinformation
performance. Therefore, it is essential to reconsider resource
with its respective transmission quality to obtain the final
utilization from a semantic perspective to develop new
evaluationresults.Aftercapturingtheimage,theUAVsendsit
performance metrics [142].
to the user and first extracts the semantic information through
Similarly, we will give a systematic summary and com-
O
the target detector. Specifically, a total of U objects are
parison of these new metrics in Table VIII, including a
detected, where i represents the i-th object and ci represents
critical evaluation of their strengths,limitations and suitabil-
its corresponding confidence. The relationship between the
ity for different modalities and applications. Considering
importance score Δi and the confidence ci of the object i can
that most of these new metrics are based on the con-
be expressed as Δi =c
i
σ , where σ is a variable that regulates
cept of semantic similarity, we illustrate the connections
the importance between different semantic information. The
and evolution of the semantic similarity-based metrics in
final MIST can be expressed as follows:
Fig. 8.
(cid:9)U
1) Semantic Transmission Rate and Semantic Spectral
E(A,Δi ,Q(pi))=A (Δi ×Q(pi)), (26) Efficiency: Firstly, reference [36] assumes that the semantic
i=1 unit (sut), representing the basic unit of semantic information,
where A represents the accuracy of extracting semantic canmeasuresemanticinformationinthetexttransmissionsce-
information, and Q(pi) represents the SSIM value of target nario. Then, two critical semantic-based performance metrics
i before and after transmission, which is a function that is are defined: semantic transmission rate (S-R) and semantic
positively correlated with the transmission power pi [43]. spectral efficiency (S-SE).
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2981
Only SemCom that reaches the semantic similarity threshold
ξ th required by the downstream task is considered effective.
Let η n,m denote whether the user n performs an effective
semantic transmission on the subchannel m. If ξ n,m > ξ th,
then η n,m = 1; otherwise, η n,m = 0. Ψ is called ES-SE,
which can be expressed as:
(cid:9)N (cid:9)M
Ψ= xn,m η n,mΦn,m , (29)
n=1m=1
where Φn,m is the S-SE of the user n in the subchannel m.
3) Task-Oriented S-R and S-SE: The authors of [109]
integrateS-RandS-SEintothescenariooffeatureimportance-
aware image classification, and two performance metrics of
the task-oriented SemCom system are defined: task-oriented
semantictransmissionrate(TOSR)andtask-orientedsemantic
spectral efficiency (TOSSE). Unlike the definition of [36],
whichconsiderslong-termtexttransmissionratherthansingle-
sentence transmission, the work of [109] focuses on the
performance ofeach user.Whenasemantictransmissiontime
slot begins, there are S semantic features after joint source-
channel coding (JSCC). BS obtains the feature transmission
Fig.8. Metricsthatbasedonsemanticsimilarity,theirconnections. ratedecisionvectorrf
basedonthechannelconditionsandthe
f
historical data distribution of each user. Then rn is fed back
tothefeatureselectionmoduleineachuserntodeterminethe
• S-R: S-R refers to the effective transmission of semantic number of features that need to be transmitted: Sn =rn f S/2.
information per second, measured by suts/s, as follows:
Therefore, the average semantic information for each symbol
Γn,m = WI ξ n,m , (27) of user n is In,m /Sn.
knL • TOSR: TOSR refers to the amount of semantic
allsubchannelbandwidthwasallocatedequally,usingW information effectively transmitted per second for a spe-
to represent the subchannel bandwidth. Since the article cific task. The expression is as follows:
focuses on long-term text transmission rather than the
WIn,m
transmission of a single sentence, I, L should take the ψ n,m = ξ n,m . (30)
Sn
expectedvalueandnottherandomvalue,thatis,foreach
user n, I/L is a fixed value, so omit the subscript n. The Compared to [36], it is equivalent to replacing I/knL
unitofI/knLissuts/symbol,andthechannelbandwidth (unit: sut/symbol) with In,m /Sn (unit: sut/symbol) of
of the band pass transmission in the ideal state is equal Eq. (27) in this paper, while the other parts remain
to the symbol rate (unit: symbol/s), so the unit becomes unchanged.
suts/s after multiplying by W. The semantic similarity • TOSSE: TOSSE refers to the rate at which task-related
based on BERT ξ n,m depends on the structure of the semantic information is successfully transmitted through
DeepSC neural network kn and the channel conditions a single bandwidth unit. The expression is as follows:
γ n,m. It can be expressed as ξ n,m =f(kn ,γ n,m).
ψ n,m In,m
• S-SE: S-SE refers to the rate at which semantic φ n,m = = ξ n,m . (31)
information is successfully transmitted within a unit W Sn
bandwidth, measured by suts/s·Hz, as follows: 4) Semantic Energy Efficiency: Based on the concept of
Γn,m I S-R [36], semantic energy efficiency (S-EE) is introduced
Φn,m = = ξ n,m , (28) in [88] as a measure of energy efficiency in the SemCom
W knL
system, which is quantified by suts/Joule. Traditional com-
The proposal of S-R and S-SE provides an impor-
munication systems define energy efficiency as the number
tant theoretical basis for many subsequent studies such
of bits that the system can transmit per unit of consumed
as [88], [90], [109]. Based on these two metrics, they made
energy. From a semantic point of view, the feature of S-
expansions and cross-domain transformations, and we now
EE is the number of semantic symbols transmitted by unit
continue with our discussion of them.
energy consumption. It is expressed as the S-R ratio that can
2) EffectiveS-SE: Thestudyin[90]consideredtherequire-
be achieved by the total power consumed in the SemCom
ment of semantic information similarity for downstream
network. The S-EE of user n is denoted by:
semantic tasks, and the concept of effective semantic spectral
efficiency (ES-SE) is introduced. The serious deviation of Γn wnI
semantic similarity will directly lead to inaccurate results. En = pn +pc = (pn +pc)knL ξ n , (32)
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2982 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
c
pn is the transmit power of user n, p is the electrical power it can be DeepSC-VQA [145]. In order to more reasonably
that the circuit consumed, and bn is the bandwidth. The Γn reflecttheusersQoErequirements,reference[22]established
here represents the S-R of user n. a semantic QoE model, which is expressed as:
(cid:9)
5) SemanticEntropy: Semanticinformationreliesnotonly
on the source data, but also on the specific task, which
QoEq b = wnGn R +(1wn)Gn A
is significantly different from the information defined by n∈G n b
Shannon. Consequently, the same data may contain different (cid:9) wn (1wn)
= + .
amounts of semantic information for different tasks. In this 1+e βn(ϕr n eqϕn) 1+e λn(ξ n reqξn)
n∈Gb
regard, the authors of [121] defined the semantic entropy as q
follows. (36)
Definition 1: GivensemanticsourceX,semanticentropyis
It should be noted that the authors of [22] modeled the
defined as the minimum average number of semantic symbols
complex situation of multi cell task and user. b denotes the
about data X ∈X that is sufficient to predict task Y, i.e.,
H(X;Y) (cid:2)minE (cid:2) dim (cid:12) Code E S(X) (cid:13)(cid:3) ,ES ∈E S c In ell E i q n . d ( e 3 x 6) a , n G d q b q d d e e n n o o t t e e s s t t h h e e q in -t d h ex us o e f r t g h r e o u u s p er in gr t o h u e p b i - n th c c e e ll l s l . .
(cid:12) E S (cid:13) wn and (1 wn) are the weights of the semantic rate ϕ n
s.t. P Y|Code E S(X) =P(Y|X), (33) and the semantic accuracy ξ n on the user n, respectively. Gn R
A
and Gn are the semantic rate and semantic accuracy for user
where Code E S(X)) denotes the semantic symbol vector n, respectively. β n and λ n represent the growth rates of Gn R
extracted from X with the semantic encoder ES, E S is the and Gn A . In addition, ϕr n eq and ξ n req represent the minimum
set of semantic encoders, and P(Y|X) is the conditional semantic rate and semantic accuracy of 50% scores [22].
7) QoE of Metaverse Service Providers: With the support
probability of achieving the goal of Y given X.
ofvirtualreality(VR),augmentedreality(AR),andthetactile
The constraint in Definition 1 implies that the defined
Internet, Metaverse hardware devices cannot only mobilize
semanticentropyislosslessandthatitisactuallydefinedasan
expectedvaluethroughoutthedatasetX,thatis,thesemantic all senses of the user and provide an immersive experi-
ence [146], but also revolutionize the way people interact
entropy is constant for the same task and dataset. However,
with each other and even with objects. Therefore, it is crucial
it is intractable to find an optimal semantic encoder, E , to
S
to design the QoE of Metaverse Service Providers (MSPs)
derive the semantic entropy [143]. To obtain a measure that is
as a performance indicator to measure the performance of
bothmeaningfulandmanipulableforsemanticcommunication
Metaverse Service [147]. In the proposed framework in refer-
systems, [121] utilize a well-designed DL model as the
ence[71],theauthorsaimtotransmitthesemanticinformation
encoder to obtain an approximate semantic entropy for a task,
of interest to each MSP. Therefore, the performance metrics
which is:
(cid:2) (cid:12) (cid:13)(cid:3) of the data rate, the BER, and the interest rating should be
H(X;Y) (cid:2)minE dim Code E DL(X) considered together. Thus, the QoE of the k-th MSP Uk can
(cid:12) (cid:13)
be defined as [148]:
s.t. P(Y|X)P Y|Code E DL(X) <ε, (34)
(cid:9)N
k
(cid:12) (cid:13)
where the constraint indicates that the task performance Qk = J k iT 1B k i , (37)
degradation can not exceed ε. From Eq. (34), the defined i=1
a
af
p
o
p
r
r
e
o
m
xi
e
m
nt
a
i
t
o
e
ne
s
d
em
m
a
e
n
th
ti
o
c
d,
e
t
n
h
t
e
ro
a
p
p
y
pr
i
o
s
xim
lo
a
ss
te
y.
se
A
m
c
a
c
n
o
t
r
i
d
c
in
e
g
ntro
to
py
th
o
e
f
where Nk is the number of objects that Uk is interested, J
k
i
is the normalized interest rating of Uk for the i-th object
the considered tasks can be derived based the corresponding
recommended to Uk, T is the normalized time that all MSPs
DLmodels.Therefore,[121]usesemanticentropytoconstruct
finish the transmission, and
Bi
is the BER of transmitting the
the semantic rate and semantic QoE model. We now move on k
i-th objects semantic information to Uk.
to this semantic entropy-based metric - semantic QoE.
8) System Throughput in Message: System throughput in
6) Semantic QoE: The accuracy and efficiency of message
message (STM) represents the network performance from
transmission are different from the users point of view, and
a semantic point of view, proposed by [97]. In text com-
depending on the application, users may have their own
munication, an entire text sentence ending in a cycle, or
preferences for them. For example, some users prefer higher
in voice communication, a completely emitted voice signal,
accuracy but have a certain tolerance for delay, while some
can be regarded as a message. Taking this into account, the
users may want to get a higher rate but do not need high
message rate (unit: msg/s) is interpreted as the number of
accuracy [144]. The semantic rate of user based on semantic
messages transmitted or processed per unit time under the
entropy is given as
reference of the bit rate (unit: bit/s) definition. Because the
ϕ n = k H n ˜ / D W L , (35) s fr y a s m te e m wo th r r k ou b g as h e p d ut o h n a S s h a a v n e n r o y n p s er t f h e e c o t r e y x : pressionofthesystem
(cid:9)(cid:9) (cid:9)(cid:9)
where the meaning of W and kn is the same as in Table V. S T = xnbrnb = xnbwnblog2(1+γ nb).
H˜ DL isthesemanticentropybasedonspecificDLmodel.For n b n b
text modal task, it can be DeepSC [25]. For bi-modal task, (38)
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2983
Here, n and b represent the n-th user and the b-th BS, respec- The first attribute is usually represented by a non-decreasing
tively. Among them, wnb and γ nb represent the bandwidth time penalty function f(t) ∈ T, which includes metrics like
and SNR, respectively. The system throughput represents AoI. The second attribute is captured by an error detection
the number of bits successfully transmitted per unit time function g(Xt ,Xˆ t)∈X, typically encompassing metrics such
in the system, reflecting the network performance. Therefore, asmeansquareerror(MSE)ormeanpercentageerror(MPE).
the authors of [97] defined a general bit-to-message (B2M) The third comes from practical constraints like spectrum limit
conversion function S(·), which is related to different seman- and energy consumption, denoted by a predefined function
tic encoders, knowledge matching, and message properties. C(Xt ,dt)∈C basedonsourcestatesXt andactiondt,where
Therefore, according to the bit rate rnb given by the Shannon the latter refers to the transmission policies like generation
M
theorem, the message rate r
nb
= Sn(rnb) can be naturally decisions, code rate, and resource allocation.
defined by S(·), and the expression of STM is derived as 11) Efficiency of Semantic Information: In the context
follows: of the SemCom-Industrial Internet of Things (SemCom-
(cid:9)(cid:9) (cid:9)(cid:9)
IIoT), traditional performance metrics are no longer the best
S TM = xnbrn M b = xnbSn(rnb). (39) choice. As reported in [108], a new performance metric was
n b n b
designed at the semantic level, named Efficiency of Semantic
STMcharacterizesthenumberofmessagessuccessfullytrans- Information(EoSI).Thescenarioisrelativelydifferent,andwe
mittedinthesystemperunittime,whichcanwellcharacterize needtostatethatn,mdoesnotrefertotheuserandsubchannel
network performance from a semantic perspective. indexes only here. The intelligent sensing device (ISD) in
9) Age of Semantic Information: In traditional communi- the scene is divided into m categories, so the subscript of
cation systems, Age of Information (AoI) [149] is a popular ISDm,n meansthen-thISDinthem-thclass.Thepreliminary
measure of information importance, which is defined as expression of EoSI is as follows:
Δ AoI (t) = t u(t) by measuring the information delay
UoSIm,n(t)
of the destination. u(t) is the generation time of the latest EoSIm,n(t)= . (44)
costm,n(t)
received data packet. In order to capture the freshness of
information and semantic loss in the SemCom system, the lit- UoSI is semantic information utility: considering both seman-
erature [89] proposed a new measurement method called Age tic timeliness and task accuracy, the expression is as follows:
ofSemanticImportance(AoSI).Beforegivingthedefinitionof
AoSI, the reference [89] first defined the semantic importance
UoSIm,n(t)=Fm d ,n(t)Fm a ,n(t). (45)
(SI): semantic loss caused by missing or incorrect semantic Among them, task accuracy Fm a ,n(t) quantifies the impact
content [150]. It can be expressed as ψ = 1ξ. Here, ξ is d
of semantic information on task accuracy, Fm,n(t) quantifies
the semantic similarity, which we discussed in the previous
the impact of the timeliness of semantic information on the
subsection. For example, in a text transmission task, semantic
timeliness of task results, and the timeliness of task results is
importance can be denoted as
also the standard for judging whether the task is successfully
B(x)·B(xˆ) T completed. costm,n(t) represents the resource overhead of
ψ =1ξ =1
(cid:3)B(x)(cid:3)·(cid:3)B(xˆ)(cid:3),
(40) ISDm,n to complete intelligent tasks, which is a weighting
function of bandwidth resources, local computing resources,
where B(·) represents the BERT model. The definition of and MEC computing resources. The complete expression of
AoSI can be obtained by the definition of SI and AoI: EoSI is complex. If you are interested in the details and the
Δ AoSI (t)=Δ AoI (t)·ψ(u(t))=(t u(t))·ψ(u(t)),(41) derivation process, see [108].
12) Success Probability of Tasks: In order to simulta-
where ψ(u(t)) is the semantic importance of the last received neously evaluate the impact of transmission and adaptive
semanticcompression(ASC)ontheperformanceofSemCom,
packet.
a new performance metric is defined in [106]: success prob-
10) Utility of Information: Reference [72] introduced a
ability of tasks. Reference [111] further improved the work
utility of information (UoI) metric. It encompasses multiple
in reference [106] and also adapted this performance metric.
contextualattributestocapturetheutilitygradeoftheupdates
According to [106], the definition of success transmission
transmitted to communication systems or services. From a
probability of users is first introduced, as follows:
mathematicalperspective,itcanbemodeledusingacomposite
(cid:6) (cid:7)
function:
2
an(1on)1
P(tn ≤t0)=2Q , (46)
U(t)=(Θ◦U)(D t). (42) bn δ
Here, Θ(·) : Rm → [0,M] is a non-increasing function where tn is the transmission delay of user n, P(·) is the
that converts the penalty into the corresponding utility grade. probability, and on is the semantic compression ratio. In
U :Rn →Rm,n ≥m,isanon-decreasingnon-linearpenalty practical scenarios, such as the Internet of Vehicles (IoV),
function with respect to the three attributes as follows: a large number of tasks are delay sensitive, so there are
(cid:2) (cid:3) always strict transmission delay constraints, represented by
f(t),g(Xt ,X ˆ
t
),C(Xt ,dt ) ∈T ×X ×C → F U(D
t
)∈Rm.
t0. Therefore, the users transmission success probability is
(43) P(tn ≤ t0). an = w d n 0 t 0 , wn is the bandwidth of user n,
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2984 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
• Semantic Fidelity: Defined as the fidelity between the
original vectorized data X and the received information
Xˆ. It is expressed as:
(cid:12) (cid:13) (cid:12) (cid:13)
SF ε,n X,Xˆ =fsa X,Xˆ , (49)
where the subscript n represents the vehicle n, ε repre-
sentstheindexoftheedgeserver,andfsa(·)isthefidelity
mapping function, which varies with the task.
• Semantic Timeliness: Semantics will evolve over time.
By modeling and tracking temporal changes, includ-
ing aggregating new semantic information as much as
possible, communication efficiency can be significantly
improved,andtheprobabilityoferrorsinsemantictrans-
mission can be reduced. The timeliness of the semantic
information extracted by the system is defined as:
(cid:14) (cid:15)
ST ε,n(·)=fst,ς
Tth T
, (50)
Fig.9. Therelationoftaskaccuracyandsemanticcompressionratio. Tth
where fst,ς(·) is a non-linear decreasing function with
parameter ς on semantic timeliness. T is the total delay
and d0 is the initial extraction of semantic information for
users without semantic compression. bn =
N
p
0
n
Bn
, pn is the
t
o
h
f
e
th
to
e
ta
sy
l
s
d
t
e
e
l
m
ay
,
,
a
t
n
h
d
e
T
g
t
r
h
ea
i
t
s
er
th
t
e
he
de
s
l
e
a
m
y
a
c
n
o
ti
n
c
st
t
r
i
a
m
in
e
t
l
.
in
T
e
h
s
e
s.
lower
transmissionpoweroftheusern,andN0isthespectraldensity
of the noise power.
δ2
is the variance of channel gain. The Q
The following formula defines semantic utility:
function represents the tail distribution function of a standard Qa n ll =ζ n SF ε,n +χ n ST ε,n . (51)
normal distribution. So we can obtain the n-th users success
probability of tasks: Among them, ζ n and χ n are the preferences of semantic
fidelity and semantic timeliness, respectively.
Ωn =η(on)×P(tn ≤t0), (47) 15) SemComQoS: Semanticsimilarityisfurtherpromoted
by [53], and SemCom QoS (SC-QoS) based on Semantic
where η(on) is the probability of which task is success-
Quantization Efficiency (SQE) is created as follows:
fully executed under successful transmission. It can be seen
• SQE: In order to solve the tradeoff between semantic
from (47) that the task success probability proposed by [106]
accuracyandthenumberofbitsconsumed,anewmetric,
for evaluating SemCom performance can control the tradeoff
SQE, is proposed. This metric quantifies the ratio of the
between semantic transmission and semantic understanding.
semantic similarity gain of each semantic feature to the
13) Transmission Efficiency of Tasks: In [112], the authors
bit-relatedsemanticsimilaritygain.Duetoitsstrongcor-
modeled the physical channel as a non-trainable fully con-
relation with the novel semantic bit quantization (SBQ)
nected layer to simulate different channel states. With the
proposedintheirwork,thesecontentsarenotintroduced.
help of the curve fitting method, the mathematical relation-
See [53] for more details.
ship between compression ratio and task performance under
• SC-QoS: Defined based on SQE and transmission delay,
different channel states is explored. Then a new measurement
and the effective SC-QoS is expressed as:
standard is established in [112]: transmission efficiency of
(cid:9)N (cid:12) (cid:13)
tas T k h s. e transmission efficiency of the task is defined as the Ψ= (cid:19)(cid:16) n (cid:11) −φ G G(cid:16) n , (52)
n=1
weighted sum of the number of packets from each user and
the corresponding achievable task accuracy at the receiver. where the users index is n, (cid:19)(cid:16) n (cid:11) is the effective SQE
Specifically, the semantic task transmission efficiency vt in (the sum of SQE whose semantic similarity satisfies the
time slot t is defined as follows: minimum threshold), G(cid:16) n is the delay, and φ G is the
(cid:9)J (cid:9)N j balance coefficient.
vt = vt n,j ×A n t ,j. (48) 16) Semantic Score: To measure the overall semantic loss
betweentheoriginalsentences andthereconstructedsentence
j=1n=1
ˆs atthereceiver,theworkin[151]definesanewmetricnamed
Thesubscriptndenotesusernandjdenotestheintelligenttask SemanticScore(SS).whichcombinesthebestoftwodifferent
n,j
j corresponding to user n. At is the classification accuracy quantities, BLEU score and sentence similarity which uses
n,j
and vt is the number of data packets that each user can BERT. The BLEU score cannot handle word synonyms, but it
transmit in slot t. is a fast and low-cost algorithm that is language independent
14) Semantic Utility: The reference [107] proposed a and corresponds to human judgment. The sentence similarity
semantic utility measurement method that considers semantic score using BERT vectors is slow and has ratings comparable
timeliness and semantic fidelity. to the BLEU, but it also handles synonyms. Let Δλ(s,ˆs)
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2985
denote the SS between sentence s and ˆs, which is a convex
combination of BLEU(s,ˆs) and ξ(s,ˆs).
Δλ(s;ˆs)=(1λ)BLEU(s,ˆs)+λξ(s,ˆs), (53)
where λ∈[0,1] is a parameter.
In this section, we explore the construction of the objective
function in resource allocation of SemCom, which is a key
to the modeling of optimization problems. We provide a
detailed review of performance metrics, categorizing them
into two types. The first type includes traditional metrics
such as delay and energy consumption, while the second type
focuses on new metrics based on semantic similarity. We give
two comprehensive comparative matrices to better synthesize Fig. 10. The taxonomy of centralized resource allocation algorithms in
findings across references. To further clarify the influence of SemCom.
different resource types on these performance metrics, we
provide a resourcemetric mapping summary in Table VII,
(SCA) methods, and the interior point method, as well as
in which we use some clear examples in different studies to
some other mathematical algorithms based on other mathe-
illustrate this influence.
maticalalgorithms,suchastheHungarianalgorithm[153].An
optimizationalgorithmbasedonconvexoptimizationtypically
IV. CENTRALIZEDRESOURCEALLOCATIONALGORITHMS
combines several of these techniques.
In order to realize resource allocation in SemCom and
1) Lyapunov Optimization: Lyapunov optimization is a
meet the requirements of these performance metrics proposed
powerful long-term resource optimization scheme to find
above, advanced resource allocation strategies and algo-
stability or equilibrium points of dynamical systems with
rithms are essential. The optimization problem constructed
stochastic properties of nonlinear systems. It requires less
is extremely complex and differs significantly from the tra-
priorknowledgeandhaslowcomputationalcomplexity[154].
ditional communication architecture in terms of objectives,
Lyapunov optimization focuses on analyzing and optimizing
constraints, and optimization variables. It is a challenge to
stochasticnetworks(networkscharacterizedbyrandomevents,
construct a well-performing optimization algorithm that can
time-varying dynamics, and uncertainties). It is particularly
adapt well to SemCom. Currently, there are a variety of
well-suited for applications in communication systems and
centralized algorithms for resource allocation in SemCom,
queueingsystems.Theauthorsof[102]adoptedtheLyapunov
mainlyconsistingofconvexoptimization,heuristicalgorithms,
optimization method to solve the problem, which first trans-
andDRL.Fig.10showsthetaxonomyofcentralizedresource
formsthelong-termconstraintsintoqueuestabilityconditions
allocation algorithms in SemCom.
using the concept of virtual queue and then transforms the
In recent years, many researchers have summarized the
long-termobjectivefunctionandthequeuestabilityconditions
state-of-the-art resource allocation algorithms of various sce-
intosolvableshort-termsubproblems.Similarly,[59]and[118]
narios in their surveys. In [16], the authors summarized
also used Lyapunov optimization techniques to transform
different optimization methods for resource allocation in edge
the original stochastic optimization problem of multiple time
computing. The comparison tables of different papers are
slots into a series of deterministic problems in a single
designed according to the objective, brief description of
time slot. Lyapunov optimization, as a stochastic optimization
the methods, advantages, and disadvantages. Reference [152]
method, enables online decision making while maintaining
summarized different resource allocation schemes for the
sub-optimal performance. Therefore, it applies well in a
two dominant vehicular network technologies, e.g., Dedicated
long-term stochastic scenario in SemCom system, like the
Short Range Communications (DSRC) and cellular-based
semantic-aware dynamic long-term MEC systems using time
vehicular networks. In this subsection, centralized resource
division duplexing (TDD) in [59]. Lyapunov optimization can
allocation optimization algorithms from different literature in
also combine with DRL-based method, in [72], expanding on
SemCom are reviewed.
the Lyapunov transformation, the UoI minimization problem
is converted into a sequence of deterministic single time-slot
A. Algorithms Based on Convex Optimization and optimization problems. Subsequently, the DRL-based method
Mathematical Techniques PPO(willbeintroducedlaterinSectionIV-B)isusedtotackle
Because resource allocation involves a lot of variables this problem.
and constraints, the corresponding optimization problems are 2) Alternating Optimization Algorithm: The alternating
usuallycomplex,evennon-convexorNP-hard.Aconsiderable optimization(AO)algorithmistodecomposetheoptimization
part of the research transforms the non-convex problems into problem into several sub-problems, and then these sub-
near-convex or convex optimization problems, which leads problems are solved iteratively. Commonly used in the case
to feasible convex optimization methods. The main tech- of multi-variable optimization, which iteratively optimizes
niques include Lyapunov optimization techniques, alternating each variable while treating other variables as a fixed value.
optimization (AO) algorithms, successive convex approximate Depending on the specific problem, the complexity of the
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2986 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEVIII
COMPARISONBETWEENDIFFERENTNEWSEMANTICMETRICS
decomposed problem varies; the simpler case is decom- extraction strategy subproblem and the wireless resource
posed into two to three subproblems, where each subproblem allocationsubproblem,whichwillbeoptimizedalternatelyand
optimizes a single variable in [44], [45], [57], [91], [98], iteratively, where each of the two subproblems also employs
[119], [130], [132]. As the problem and the optimization the AO algorithm to optimize the corresponding parameters.
variables increase, the optimization problem is decomposed Aniterationofthealgorithmforthetotaloptimizationproblem
into three subproblems in which the subproblem has two or contains the number of iterations L1 and L2 of the AO
more optimization variables in [59], [66], [67], [74], [93], algorithm for the two sub-problems.
[100], [105]. A more complicated situation occurs in [68], 3) Successive Convex Approximate: The idea behind suc-
where the paper employs a nested AO algorithm to divide cessive convex approximate (SCA) istofindalocallyoptimal
the optimization problem into two subproblems: the semantic solution to the original problem by iteratively solving a series
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2987
Algorithm 1 Basic SCA Algorithm for Problem P maximummatchingofabipartitegraphbasedonanymatching
Find a feasible solution x ∈ X in P, choose a step size ifwehaveawaytokeepsearchingforaugmentingpathsuntil
θ ∈(0,1] and set k = 0. eventuallywefindnonewaugmentingpaths.Thecoreideaof
Repeat theHungarianalgorithmistoiterativelysearchforaugmenting
1) Compute xˆ(xk ), the solution of P xk; paths to get a maximum match.
2) Set
xk+1 =xk +θ(xˆ(xk ))xk
; The Hungarian algorithm can solve the allocation problem
3) Set k ←k +1 in polynomial time, which can significantly reduce the algo-
Until convergence criterion is met. rithmic complexity. When it comes to the scenario of the
resource allocation problem in SemCom, it is usually used
for the subproblem of subcarrier pairing/subchannel alloca-
of convex optimization problems similar to the original non- tion after the original optimization problem is decomposed
convex problem. Consider the following optimization: by the AO algorithm above. In the literature [36], [109],
and [57], the optimization subproblem of channel allocation
P:min U(x) (54) is regarded as a bipartite graph matching problem, and then
x
the Hungarian algorithm is used to solve this optimization
s.t. gl(x)≤0, ∀l =1,...,m (54a) subproblem. Among them, the knowledge-assisted proximal
x∈K (54b) policy optimization (K-PPO) algorithm is proposed in [109],
which uses the Hungarian method to determine channel
where the objective function and constraint (54a) is smooth allocation, greatly reducing the complexity of the original
(possibly nonconvex), the feasible set is denoted as X. The proximal policy optimization (PPO) algorithm by introducing
original non-convex or non-concave function is transformed the Hungarian algorithm. The details of PPO will be intro-
into a series of convex or concave functions. The convex duced later in Section IV-B.
approximationoftheoriginalproblemcanbestatedasfollows: 5) Lagrange Methods: The Lagrange multiplier method
given xk ∈X: is a common method for solving constrained optimization
(cid:12) (cid:13)
problems. For the optimization problem with only equation
P xk:m x in U˜ x;xk (55) constraints, you can directly use the Lagrange multiplier
method to list the Lagrange function, which will be trans-
(cid:12) (cid:13) formed into an unconstrained optimization problem to solve.
s.t. g˜l x;xk ≤0, ∀l =1,...,m (55a) Fortheoptimizationproblemwithinequalityconstraints,using
x∈K (55b) the Lagrange function to optimize it must satisfy the Karush-
Kuhn-Tucker(KKT)condition,whichisanecessarycondition
whereU˜(x;xk )andg˜l(x;xk
)representtheapproximationsof for taking the optimal parameter values and a sufficient
U(x)andgl(x)atcurrentiterationxk
,respectively,thefeasible condition for some special convex optimization problems.
set is denoted as
X(xk
). We can summarize the basic SCA Problems containing inequality constraints after listing the
algorithm in Algorithm 1. Lagrangian function still have constraints that are not easy to
This process is repeated until the stopping criterion is deal with, then it can be transformed into a Lagrangian dual
satisfied. It is assumed that at each iteration, some original problem; this dual problem must be a convex optimization
functions are approximated by their upper bounds, where the problem and therefore easy to solve. But in order to make
same first-order behavior is preserved [155]. the dual problem and the original problem have the same
Since an approximate solution to the original optimization solution, it must satisfy the strong duality. The sufficient
problem is solved in each iteration, there is no condition is Slaters condition; the necessary condition is the
guarantee that the global optimum will be obtained. KKT condition. Lagrangian methods have been employed
The convergence of the method is guaranteed due to in many works, where the problem is decomposed into
convexity/concavity [19]. subproblems and then the sub-optimization problem is solved
AO algorithms and the SCA algorithm are two methods using Lagrangian methods [57], [68], [102], or the problem
that work well with each other, and almost all the literature is transformed directly using the Lagrangian methods to
on SCA uses a combination of the two. Decomposing a solve [78].
largenon-convexoptimizationproblemintoseveralsmallnon- Summary: Traditional optimization algorithms based on
convex optimization subproblems to solve iteratively reduces convex optimization techniques and other mathematical
the difficulty/complexity of the SCA algorithm, thus allowing algorithms are applicable to small-scale solutions and high-
the difficulty and complexity of the overall problem to be reliability demand scenarios. They have the following
reduced[44],[45],[49],[59],[67],[68],[70],[91],[92],[106], advantages: a) mature and widely used; b) easy to obtain sub-
[111], [119]. optimal optimization results; c) not relying on data. However,
4) Hungarian Algorithm: The solution to the maximum algorithms based on these techniques are often too complex.
matching problem in bipartite graphs is the origin of the As a result, its complexity makes it difficult to implement in
Hungarian algorithm. Since a maximum matching of a bipar- practical systems and not suitable for large-scale problems.
tite graph necessarily exists, e.g., the upper bound is a perfect Although algorithm complexity may vary due to different
matching that contains all vertices, it is possible to get a problems and scenarios, we can still give a brief summary
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2988 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
of these algorithms. In terms of computational complexity, With the development of DL and reinforcement learning
Lyapunovoptimizationitselftypicallyhasthelowestcomplex- (RL)techniques,puredata-drivenDRLhasbecomeapowerful
ityduetoitsonlineanddynamicnature,makingitsuitablefor tooltosolvecomplexresourcemanagementproblemsinrecent
real-time systems. The complexity of Lyapunov optimization years [81], [156], [157]. By efficiently learning the dynamics
is primarily determined by the per-slot deterministic sub- of the environment, DRL can provide resource allocation
2 3
problem, and often falls in the range of O(n ) to O(n ) strategiesthatmaximizelong-termreturnsbasedonpretrained
when convex formulations are involved, making it particu- policy networks.
larly suitable for low-latency real-time systems. Alternating RL and DRL approaches can be mainly distributed in two
optimization (AO) and Lagrangian methods exhibit moderate ways:basedonvaluefunctions(1-4)andbasedonpolicygra-
complexity, with AO being effective for decomposable non- dients(5-9).Thispaperalsoprovidesabriefdescriptionofthe
convex problems and Lagrangian methods for constrained algorithms based on these techniques in various publications.
optimization. The complexity of AO is mainly determined by 1) Q-Learning: Q-Learning (QL) [158] is an off-policy
the complexity of solving each subproblem. For instance, if control method for finding the optimal policy, mainly used in
each subproblem involves convex optimization with complex- discrete action space. The core idea is to utilize a Q function
3
ity O(n ), and k such subproblems are solved per iteration, that represents the expected reward of taking an action in
thetotalcomplexityperiterationbecomesapproximatelyO(k· a particular state. The Q function updating rule satisfies the
3
n ). For Lagrangian-based methods, the overall complexity Bellman equation:
depends on both the structure of the primal problem and the (cid:17) (cid:18)
(cid:2) (cid:3)
methodusedforupdatingdualvariables.Iftheprimalproblem Q(s,a)←Q(s,a)+α r +γmaxQ s (cid:4),a (cid:4) Q(s,a) .
admitsaclosed-formsolution,eachiterationmayinvolveonly a(cid:2)
2
dual updates with complexity around O(n ), leading to a (56)
total complexity of O(K · n 2 ), where K is the number of
iterations. However, if the primal problem requires solving In [71], the selection of public messages uses QL techniques.
a numerical optimization (e.g., quadratic programming), the The work of [124] compares the QL-based approach with
per-iteration cost may increase to O(n 3 ), resulting in a total the convex optimization-based approach under the video
complexity of O(K ·n 3 ). Successive convex approximation semantics-drivenresourceallocationproblem.Theexperimen-
(SCA)tendstohavehighercomplexityduetoiterativeconvex tal results prove that the QL-based approach performs better
approximations. Each subproblem often requires O(n 3 ) time, than the convex optimization-based approach.
and the total complexity O(T ·n 3 ) grows linearly with the 2) DeepQNetwork: Mnihetal.[159]introducedthedeep
number of iterations T. Thus, SCA is suitable for non- Qnetwork(DQN),whichpioneered thefieldofDRL.Inreal-
convex problems with a manageable size and structure. The world scenarios, the number of states can be large, making
3
Hungarianalgorithm,withacomplexityofO(n ),isefficient the construction of Q-tables computationally intractable. To
for small-scale linear assignment problems but less scalable addressthislimitation,DQNusesaneuralnetworktoestimate
for larger systems. Table IX reviews the literature using the Q-values of each state-action pair. The most important
these traditional optimization techniques, which are based feature of DQN is that it uses experience replay [160]
on convex optimization techniques and other mathematical and target networks to stabilize the training of deep neural
algorithms. networks [161]. As mentioned in the previous paper, [89]
defined the AoSI metric. In the paper, the long-term average
AoSI optimization problem is modeled as an MDP, and a
DQN-based algorithm is proposed to find the suboptimal
B. Algorithms Based on Deep Reinforcement Learning solution for source scheduling and the number of semantic
In the context of SemCom, direct modeling of the relation- symbols.Comparedwiththesimplerstatespacecasemodeled
ship between semantic accuracy (or fidelity) and optimization intheliterature[71]usingQL,mostoftheresourceallocation
variables, such as the semantic compression ratio, is often problems in SemCom have a more complex state space, so
infeasibleduetotheabsenceofexplicitanalyticalexpressions. DQNisobviouslymoresuitable.In[22],theexhaustivesearch
Then results in the non-differentiable and implicit objectives. to solve the semantic compression subproblem will lead to
To address this challenge, some authors [112], [121] use high computational complexity. Because when using exhaus-
different curve fitting techniques to approximate this implicit tivesearchtosolvethiscombinationoptimizationproblem(for
relationship. For instance, in [121], neural networks are K-users,thereareK!permutations),thecomplexitywillgrow
adopted to fit the relationship curve of semantic fidelity and exponentially with the number of users and cells. Therefore,
optimization variables (power, channel assignment, semantic in the journal version of [22], that is, the reference [121], the
compression)foreachtask(singlemodalandbi-modal).Once authorsproposedasolutionthatcombinesDQNandmatching
this approximation is obtained, the originally implicit objec- theory. The exhaustive search is replaced by the DQN-based
tive becomes differentiable or at least numerically tractable. method to improve overall QoE effectively.
However, after curve fitting, the output fitting function is still 3) Double Deep Q Network: Hasselt et al. [162] proposed
complex and non-convex. Traditional mathematical methods the double deep Q network (DDQN) to solve the over-
are often difficult to model or calculate in the face of these estimation problem in QL. The DDQN algorithm borrows
complexities. from the double-Q learning algorithm [163] and makes
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2989
TABLEIX
CENTRALIZEDALGORITHMBASEDONCONVEXOPTIMIZATIONMETHODANDMATHEMATICALTECHNIQUES
improvements to the DQN algorithm: estimating the pol- went one step further than the QL-based work [124]
icy based on the online Q-network, selecting the action, that was already mentioned. They wanted to improve the
and estimating the Q-value with the target network. Some accuracy of video semantic understanding and build a
experimental results show that DDQN finds a better strat- multidimensional resource allocation model that combined
egy than DQN in Atari games. The authors of [82] communication, computation, and caching. They designed
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2990 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
the DDQN-based algorithm, which is shown to achieve bet- have also been attempts in the literature to use TD3 instead
ter results than those achieved by the QL-based approach of DDPG as the base algorithm of the scheme [107], [108],
in [124]. in which [107] proposed a TD3-driven dynamic semantic-
4) DuelingDoubleDeepQNetwork: Duelingdoubledeep aware algorithm: dynamic semantic-aware TD3 (DSATD3)
Q network (D3QN) is a combination of Dueling DQN [164] for a federated learning-driven semantic vehicular network
and DDQN. Dueling DQN separates the computation of to guide agents in adopting accurate semantic extraction and
Q-values into two components: the value function (V) and resource allocation strategies. The simulation results showed
the advantage function (A), which enables Dueling DQN to that DSATD3 has better performance compared to DDPG-
provide more accurate Q-value estimation while needing less based approaches.
discrete action data, thus improving sample efficiency. As in In contrast to the previous two papers, the work in [75]
Table X, the authors of [90] and [94] both use D3QN for improves the TD3 algorithm and proposes the TD3-RNS
discrete action in the whole DRL framework. algorithm (TD3 with reference neuron-enhanced Softmax) to
5) Actor-Critic: The actor-critic (AC) [165] algorithm solvealong-termsemanticthroughputmaximizationproblem.
learns both the policy and the state-value function, using the The actor network uses a reference neuron technique and a
value function to reduce variance in policy updates. Actor- linearly decreasing Gaussian action noise in the output layer
criticmethodstendtobemorestablethanpurepolicygradient to enhance training efficiency and balance exploration and
methods. In the work of [58], the allocation of transmitted utilization by the agent.
semantic information and resource block (RB) was jointly 8) Proximal Policy Optimization: Proximal Policy
optimized to minimize the average transmission delay, based Optimization (PPO) is proposed by Schulman et al. [169]
ontheimprovedACalgorithm,inwhichanovelvaluefunction in 2017. PPO aims to improve and simplify previous policy
is designed to improve the probability of action exploration gradientalgorithms,suchasTrustRegionPolicyOptimization
and finding the optimal solution. In traditional model-free (TRPO).ThekeyaspectofthePPOalgorithmisthatitmakes
DRL, the value function V(s k+1) is approximated by DNN: the learning process more stable by limiting the magnitude
E s P[V(sk+1)].Inthemodel-basedDRLproposedinthe of policy updates. The authors of [71] designed a power
k+1
article, due to the deterministic nature of the state transitions, allocation algorithm to maximize the total QoE based on
there is E s P[V(sk+1)] = V(sk+1). Therefore, the PPO. The algorithm can appropriately allocate the power of
k+1
proposedalgorithmdoesnotneedtouseDNNtoapproximate public and private messages to maximize the total QoE while
the value function. As a result, the estimation error resulting guaranteeingindividualQoEforeachMSP.Accordingto[95],
fromtheapproximationofthevaluefunctioncanbeprevented, the authors proposed a semantic-aware resource allocation
andthestate-actionvaluefunctioncanbecomputedaccurately. framework with a flexible duty cycle co-existence mechanism
More details about the algorithm can be found in [58]. (SARADC) algorithm that utilizes PPO to optimize resource
6) Deep Deterministic Policy Gradient: Silver et al. [166] allocation in high-speed vehicular networks.
proposed the deterministic policy gradient (DPG) algorithm We mentioned in Section II-B3 that in task-oriented
for RL problems with continuous action spaces. The deter- SemCom systems, the resource allocation is closely tied
ministic policy gradient is the expected gradient of the to the task-related importance of the semantic information.
action-valued function, which integrates over the state space Thistaskdependencenecessitatesadaptiveresourceallocation
andcanbeestimatedmoreefficientlythanthestochasticpolicy schemes that align with the utility of semantic content,
gradient. Lilicrap et al. [167] proposed the deep deterministic ensuring the transmission of task-related and semantically
policy gradient (DDPG) algorithm in the continuous action importantfeatures,whilejointlyoptimizingbandwidth,power,
space by extending DQN and DPG. DQN can only handle and computing resources for overall system performance.
discrete and low-dimensional action spaces, but many cases, However, traditional PPO methods struggle to handle such
especially physical control tasks, have continuous and high- cross-layer optimization under semantic-aware constraints. To
dimensional action spaces, and DQN cannot be directly thisend,[109]and[40]madenovelimprovementstothePPO
applied to continuous domains, so DDPG adopts the AC algorithm. Reference [109] proposes a knowledge-assisted
method based on the DPG algorithm. PPO (K-PPO) algorithm, which utilizes a prior model and
Theauthorsof[112]developedajointoptimizationproblem the Hungarian algorithm to assist PPO in solving the joint
of semantic feature compression rate, transmit power, and optimization problem of importance-aware semantic feature
bandwidth for each smart device to maximize the long-term selection and channel assignment within the joint semantic-
transmission efficiency of the task. A DDPG-based wireless channel transmission (JSCT) mechanism. Meanwhile, [40]
resource allocation scheme is proposed to efficiently handle develops an attention-enhanced PPO (APPO) by introducing
the continuous action space. the attention network [27], enabling the base station to learn
7) Twin Delayed Deep Deterministic Policy Gradient: the correlation between the semantic importance distribution
Twin delayed deep deterministic policy gradient (TD3) is f i(G i)andthetaskperformancemetricMSS,thusoptimizing
proposedbyFujimotoetal.[168]basedontheimprovementof the resource block (RB) allocation and semantic information
theDDPGalgorithm.TheTD3algorithmincorporatestheidea selection strategies accordingly.
of the double Q-learning algorithm into the DDPG algorithm. 9) Soft Actor-Critic: The soft actor-critic (SAC) algo-
Adetaileddescriptioncanreferto[161].FromACandDDPG rithm[170]isamodel-freeDRLalgorithmbasedonmaximum
to TD3, with the evolution of these RL algorithms, there entropy, introducing the concept of maximum entropy on
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2991
TABLEX
results are difficult to interpret, which will affect the credi-
DIFFERENCEINCOMBINATIONOFDRLALGORITHMS
bility and acceptability of the results. c) DRL algorithms are
sensitivetotheselectionofhyperparametersandtrainingdata,
and the instability is higher. Table XI reviews the literature
using DRL-based centralized optimization algorithms.
C. Heuristic Algorithms
A heuristic algorithm is an algorithm based on an intuitive
or empirical construction that usually performs well with
limited computational resources and is suitable for scenarios
with low performance requirements to fulfill engineering
needs. They can provide effective approximations, but are not
guaranteed to find the global-optimal solution.
As we mentioned earlier, semantic similarity does not
have a closed-form expression. This can be regarded as a
closed-box optimization problem, which is difficult to solve
with traditional optimization algorithms. Heuristic algorithms
provide a feasible way to solve the closed-box problem.
top of maximizing future cumulative rewards to enhance Reference [88] proposed a variant of the Whale Optimization
the robustness and exploration ability of agents. In refer- Algorithm (WOA) [171] that introduces a penalty strategy:
ence [53], a dynamic intelligent resource allocation scheme the Whale Optimization Algorithm with a Penalty Strategy
was designed. It is based on SAC and D-SAC to realize (WOARA) to solve the optimal resource allocation problem.
real-time decision-making based on perceptual semantic tasks More details about WOA and WOARA can be seen in [88].
and channel features. Among them, D-SAC is to extend SAC Theauthorsof[53]usetheparticleswarmoptimization(PSO)
to discrete space to solve the discrete variable allocation algorithmtooptimizethecompressionratioandtheallocation
problem. The Four-Soft Actor Critical (4-SAC) algorithm is of power and bandwidth for each user jointly. In [77], the
proposed in [83]. It comprises four SAC intelligent agents, PSO algorithm is developed to determine the computation
which collectively optimize the trajectory of a UAV, number resource allocation in each step of the matching game. There
of semantic symbols, and power allocation to strike a balance are also a few other works that incorporate heuristics into
between data transmission efficiency and energy efficiency, the overall program design, such as [78], which also uses a
and QL was used to facilitate learning for the optimal policy. preference list-based heuristic algorithm for problem solving.
In fact, the challenge of highly coupled and non-convex Furthermore,[66],[70],[118],[131]haveincorporatedsimple
optimization variables is particularly critical in SemCom. heuristics such as greedy algorithms into their overall pro-
Unlikeconventionalsystems,whereoptimizationvariablescan gram design. Table IX also includes papers that use heuristic
often be easily decoupled or approximated linearly. In the algorithms.
resource allocation problem of SemCom, the composition of Summary: Heuristic algorithms have some advantages in
optimization variables is very complex and hard to decouple, terms of cost and convergence speed, but their performance
which may be both in the case of discrete action space: is relatively poor, are prone to fall into local optimal, and
semantic symbol number selection, subchannel allocation, are sensitive to parameters. Therefore, they are applicable for
communication mode selection, and some discretized vari- scenarios that only have requirements on low latency and do
ables, etc., and in the case of continuous action space: power not have high demands on other performance metrics.
allocation, bandwidth allocation, semantic compression rate, In this section, centralized resource allocation optimization
etc.Totacklethiscomplexity,recentstudieschosetocombine algorithms from different literature in SemCom are reviewed.
two or more of these methods to solve the problem [47], These algorithms are categorized into several types, includ-
[55],[61],[71],[90],[94],combiningthevaluefunction-based ing those based on mathematical optimization (Lyapunov
method and the policy gradient-based methods to form a two- optimization, AO algorithm, SCA, etc.), DRL (value-based
layer DRL framework, which is also succinctly summarized and policy-based), and heuristic methods. While previous
in Table X. sections have systematically categorized performance metrics
Summary: Centralized optimization algorithms based on and optimization strategies, it is also crucial to understand
DRL are applicable to highly dynamic scenarios. They have how these elements interact across various network scenarios.
the following advantages: a) They can deal with high- Whileexistingworksproposevariousoptimizationtechniques
dimensional, nonlinear state and action spaces, making them tailored to SemCom scenarios, there remains a lack of in-
suitable for complex decision problems. b) It can adap- depth discussion on how these methods specifically address
tivelylearntheoptimalpolicywithoutexcessivemathematical the unique challenges Table XII provides a challenge-centric
derivationandcomputation.However,italsohasthefollowing synthesis of representative works, their applied optimization
disadvantages: a) High complexity of training. b) Closed-box techniques, and directions for future hybrid or enhanced
process: the learning process is unobservable, and the output methods.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2992 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEXI
CENTRALIZEDOPTIMIZATIONALGORITHMSBASEDONDRL
V. DISTRIBUTEDRESOURCEALLOCATIONALGORITHMS
Nowadays, the network structure of wireless commu-
nications is increasingly oriented toward a multilevel
heterogeneous network structure, and efficiently managing
resource allocation in such a complex environment requires a
fundamental shift from traditional centralized mechanisms to
self-organizing and self-optimizing approaches [172]. In this
context,moreandmoredistributedmethodshavebeenutilized
to meet the increasingly complex situation. This section will Fig. 11. The taxonomy of distributed resource allocation algorithms in
SemCom.
provide an illustration of the distributed optimization algo-
rithmsusedintheliteratureonresourceallocationinSemCom, A. Multi-Agent Deep Reinforcement Learning
among them matching theory and auctions originating from
Multi-agent reinforcement learning (MARL) is the appli-
thefieldofeconomics,andaportionofreinforcementlearning
cation of reinforcement learning ideas and algorithms to
with multi-agents. Fig. 11 shows the taxonomy of centralized
multi-intelligent systems, extending MARL to deep reinforce-
resource allocation algorithms in SemCom.
ment learning is multi-agent deep reinforcement learning
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2993
TABLEXII
MAPPINGOFSEMCOM-SPECIFICCHALLENGESTOOPTIMIZATIONSTRATEGIESANDPOTENTIALEXTENSIONS
(MADRL).In[117],directDQNisgeneralizedtomulti-agent leveraging a CTDE approach. During training, agents share
DQN,andUAVsinthecoverageareaofdifferentMECservers observations and actions to learn coordinated strategies, while
are considered agents in the DQN algorithm. However, other during execution, each agent acts independently based on its
literature utilized more refined and mature multi-intelligent own policy. Reference [123], the modified MADDPG method
body deep reinforcement learning methods, as follows: is designed to optimize both global system performance
and individual agent behavior in a dynamic semantic
1) Multi-Agent PPO/DDPG Algorithm: The multi-agent
communicationenvironment.Thesimulationresultsshowthat
PPO (MAPPO) algorithm [173] is a variant of the PPO
the proposed algorithm performs better than centralized DRL
algorithm applied to multi-agent tasks, the critic can observe
methods like DDPG and TD3.
the global state, including information about other agents and
the environment. The basic idea of the MAPPO algorithm 2) MADRL Based on Value Decomposition: MADRL
is centralized training and decentralized execution (CTDE). based on Value Decomposition (VD) is one of the many
The optimization problem of joint computational resources MADRLalgorithms.Itutilizessomeconstraintstodecompose
and bandwidth allocation is established in [126] with the the joint action-value function of a multi-agent system into a
objective of maximizing semantic accuracy. The problem is specific combination of individual action-value functions and
then transformed into a DRL framework, and MAPPO is is able to effectively solve problems such as environmental
utilized to solve the problem. non-stability and exponential explosion of the action space
MADDPG (Multi-Agent Deep Deterministic Policy in multi-agent systems, ensuring the convergence of the
Gradient)isspecificallydesignedformulti-agentsystems,also algorithm.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2994 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
In [51], a VD-based DQN is used to allow users and BSs theBERT-basedmodel.Ingeneral,whentheBLEUscoreand
to work together to find a team RB allocation and partial similarity score are higher, the device has a greater incentive
semantic information transmission scheme to optimize the to pay a higher price for energy.
similarity of all users. The work of [42] proposed a VD- Summary: The advantages of the economic approaches
based entropy-maximized MARL (VD-ERL) algorithm. The is: effective in highly dynamic and complex heterogeneous
algorithm enables each server to coordinate its work with networks, practical in real-world scenarios. However, there
other servers in the training phase, perform RB allocation are some disadvantages, which include: a) the global optimal
in a distributed manner, and approximate the global-optimal solution may not be obtained; b) in the auction, the need
performance with fewer training iterations. for an additional third-party trusted organization for auction
Summary: The advantage of MADRL is the ability to management may incur additional costs.
solvecomplexmulti-intelligentcollaborationproblems,which In this section, we explore distributed resource allocation
is in line with the trend of increasingly complex real-world algorithms in SemCom, focusing on multi-agent deep rein-
networkchanges.Thedisadvantagesarethecomplexityofthe forcement learning (MADRL), matching theory and auction
training process and the difficulty of balancing collaboration methods. MADRL, including the multi-agent PPO and value
and competition. decomposition-based algorithms, is discussed for its ability
to handle complex coordination tasks. Economic methods,
such as matching theory and auction theory, are highlighted
B. Economic Methods
for their efficiency in decentralized resource allocation in
There are two main economic methods used in distributed dynamicenvironments.Table XIIIreviewstheliteratureusing
optimization algorithms in resource allocation of SemCom: distributed resource allocation optimization algorithms.
matchingtheoryandauction.Theyaresubfieldsofeconomics
and are promising concepts in distributed resource manage-
VI. OPENCHALLENGESANDFUTURERESEARCH
ment and allocation.
DIRECTIONS
1) Matching Theory: As a powerful tool for studying
Despite the significant achievements in resource allocation
the dynamics and mutually beneficial relationships formed
research in SemCom, many key issues remain unexplored.
between different types of agents, the matching theory
This section discusses several open research challenges and
is particularly well suited to develop practical and high-
future research directions.
performance, low-complexity, decentralized solutions in these
complex networks. In particular, it can effectively cope with
the high dynamics of the network, the selfish, competitive, A. Resource Allocation Under Other SemCom Network
and distributed nature of the network elements, the limited Architectures
wireless resources, and the QoS constraints of the different The diversity of SemCom network architectures reflects
elements [174]. its adaptability to a wide range of application scenarios,
The authors of [66] used many-to-many matching to from dynamic environments to multimodal communications.
solve the subproblem of the association between RIS users. However, without tailored resource allocation strategies, these
However,theauthorsof[22]utilizedmatchingtheorytosolve architectures cannot achieve their full potential. Developing
the subproblems of channel association and power allocation. solutions for specific frameworks is critical to maximize
In order to cope with the tight coupling between users in performance under real-world constraints. This progress will
multi-cell user and bimodal user pairs, a matching game pair expand the scope of SemComs applications, driving innova-
is constructed for modeling, and a low-complexity matching tions in areas such as smart homes, autonomous vehicles, and
algorithm is proposed to obtain stable matching in this part. immersive metaverse applications.
The authors of [77] establish a many-to-one matching game 1) NetworkArchitectureCombinedWithNGMA: Resource
to determine the joint communication mode and the channel allocation problem of multi-user SemCom is particularly
selection problem, in which the users and channels act as the critical in scenarios with dense user environments or limited
game players. The computational resource was allocated by communicationresources,mostofthepreviousmultipleaccess
the PSO algorithm in each step of the matching game. methods used FDMA, OFDMA, or TDMA. However, as
2) Auction: As a subfield of economics and business communication technology continues to develop, researchers
management, auction theory provides an interdisciplinary have begun to investigate the application of the combination
technique for the allocation of wireless resources (e.g., of NGMA and SemCom in resource allocation. Incorporating
subchannels, time slots, and transmit power levels) in wire- NGMA into SemCom architectures could lead to transforma-
less systems. Auction methods are widely used in areas tive advances in scenarios requiring high connectivity, such
such as cognitive radio, cellular networks, and wireless grid as smart cities, industrial IoT, and Metaverse. Currently, some
networks [175]. In [85], the bids of IoT devices (bidders) scholars have carried out research in this field; see Section II.
for energy and power transmitters (auctioneers) are used to A 2) of this article.
determine the winner and payment by competing for the 2) Network Architecture in a Dynamic Environment:
energy of the hybrid access point (H-AP) through an optimal Dynamicenvironments,suchasvehicularnetworksordisaster
auctionbasedonDL[176].TheIoTdeviceswillbidforenergy emergency communications, are highly unpredictable due to
based on sentence similarity and BLEU score derived from factors such as user mobility, interference, and time-varying
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2995
TABLEXIII
DISTRIBUTEDOPTIMIZATIONALGORITHMSBASEDONMADRLANDECONOMICMETHODS
channel conditions. Designing resource allocation strategies standpoint,asefficientresourceallocationisessentialtoensure
that account for these dynamic characteristics is critical seamless, high-quality interactions across different types of
to ensuring robust and reliable SemCom performance. The services. At this time, the resource allocation problem for
ability to adapt to dynamic environments directly affects multimodal SemCom networks will also become a major
the networks ability to deliver semantically accurate and challenge.
timelycommunication.Moreover,thisadaptabilityisessential
for applications like real-time AR/VR, autonomous systems, B. Establishment of SemCom Related Theory
and telemedicine, where latency and semantic accuracy are
Carnap and Bar-Hillel first proposed Classic Semantic
paramount.
Information Theory (CSIT) in 1952, based on logical proba-
3) Network Architecture of Speech SemCom: The rise of bility[177].Inspiredbythispioneeringwork,sometheoretical
speech-basedinterfacesinconsumerelectronics,smarthomes, research has been carried out in the past two decades, such
and healthcare applications highlights the need for optimized as[2]and[178],butitisnotsufficient,especiallyinSemCom
resourceallocationinspeechSemCom.Unliketextandimage based on the DL framework. This gap in foundational theory
modalities, speech signals have unique characteristics, such presents a critical opportunity for advancing SemCom, as
as real-time requirements, continuous data streams, and high developing a solid theoretical framework will enable more
sensitivity to latency and noise. Addressing these challenges effective, robust communication systems in dynamic and
inresourceallocationwillbecrucialforimprovingthequality evolving environments.
and efficiency of speech communication systems. Improved 1) Building a Universal Semantic Information Theory
resource allocation for speech SemCom could enhance appli- Framework: Compared to traditional information theory,
cations such as real-time voice recognition, smart home which has been studied for many years, the development
automation, and voice-assisted healthcare, ensuring that these of semantic information theory is relatively weak. Mainly
systems operate smoothly with minimal delay. reflected in three aspects: a) So far, there has been no
4) NetworkArchitectureofMulti-ModalSemCom: Mostof unified theoretical method for how to represent and measure
the existing SemCom network models are developed around semantics. b) SemCom lacks a comprehensive mathematical
a single modality. However, scenarios such as Metaverse basis. c) It is difficult to extend the theory of traditional
require a multi-modal service model that includes multiple information theory to semantic information theory.
types of instant interactions, such as audio, image, video, and 2) BuildingMoreAdvancedSemanticPerformanceMetrics:
tactileservices.Thisrequiresamulti-modalSemComnetwork The diversity of different scenarios and tasks in which
to solve. As a result, resource allocation for multi-modal SemCom systems are deployed means that a single static
SemCom networks becomes a critical challenge. Traditional performance metric will not suffice. Moreover, shifting
single-modal resource allocation techniques, optimized for towards a user-centric SemCom paradigm is another critical
simple scenarios, are inadequate when it comes to managing challenge.Traditionalmetrics,suchasbiterrorrates,typically
the dynamic and diverse needs of multi-modal data streams. focus on technical performance, but do not capture the real-
This problem is even more important from a user-centric world effectiveness of SemCom systems from the users
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2996 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
TABLEXIV
CHALLENGESANDFUTUREDIRECTIONS
perspective. Establishing such advanced metrics will enable a are particularly useful for modeling complex, structured data,
moreaccurateevaluationofasystemsabilitytoprovidevalue suchasnetworktopologiesorrelationshipsbetweendevicesin
to users, beyond just raw data transmission efficiency. a distributed SemCom environment. GNNs can help optimize
communication pathways and improve resource allocation by
modeling dependencies between nodes in real time, problems
C. SemCom Resource Allocation Optimization Scheme
partially modeled as combination optimization problems, or
1) CombinationofMultipleAlgorithms: Theresourceallo-
other special scenarios. A simple outline below illustrates
cation problem can be solved by combining mathematical
how GNNs could help address channel assignment as a
optimization and the RL method to save computing resources
combinatorial problem in semantic communication systems:
andachievetheoptimalsolution.Similarly,combiningheuris-
1) Graph modeling: Represent users and interference links
tic algorithms with optimization allows fast, near-optimal
as a graph.
solutions in time-sensitive situations. The impact of these
2) Problem setup: Frame channel assignment as a combi-
combined techniques is significant: improved service quality,
natorial optimization problem.
reduced energy consumption, and the ability to meet the
3) GNN encoding: Use GNNs to learn node embeddings
demands of the growing user.
that capture interference and task demands.
2) FL-Enabled and Other DL-Enabled Techniques:
4) Solution generation: Predict channel assignments
Federated learning (FL) is a machine learning technology
directly or guide heuristics with learned scores.
that can train resource scheduling algorithms on multiple
5) Training feedback: Optimize GNN using corresponding
distributed edge devices or servers that do not exchange local
metrics like S-SE.
data samples [179]. FL allows edge devices to collaboratively
Diffusion models, with their generative capabilities, may
learn resource scheduling policies without sharing raw
support joint optimization of semantic compression and
semantic data. This decentralized training paradigm naturally
resource usage under strict delay or accuracy constraints.
protects user privacy, making it well-suited for privacy-
Here are some open research issues about utilizing these DL-
sensitive SemCom applications such as telemedicine or
enabled techniques in resource allocation in SemCom:
autonomous driving. While this approach remains largely
• Communicationoverheadforfrequentmodelupdatescan
unexplored, the following outline presents one possible way
be significant in FL.
to incorporate federated learning into semantic resource
• Lightweight FL protocols are needed for resource-
allocation:
constrained devices.
1) Alocalmodelistrainedoneachdevicetomakeresource
• Scalability challenges for large-scale distributed systems
allocation schemes (e.g., semantic compression ratio,
and difficulty in integrating multiple objectives (e.g.,
offloading decision).
latency, accuracy, energy) into GNN-based models.
2) Devices send model updates (e.g., gradients or parame-
• High computational cost of diffusion models may hinder
ters) to a central aggregator.
real-time deployment.
3) The server performs model aggregation and updates the
global model.
D. Other Challenges
4) Theglobalmodelisredistributedtodevicesforthenext
training round. There are still some other challenges that need to be
Additionally, other deep learning techniques, such as dif- considered in the resource allocation of SemCom.32
fusion models and graph neural networks (GNNs), can also 1) Transformation of Focus: Resource allocation in
play a crucial role in resource allocation optimization. GNNs SemComisundergoingashiftfromsystem-leveloptimization
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2997
to a user-centric approach. Traditionally, resource allocation alsosummarizeandexplainthenetworkstructureandresource
schemes in SemCom primarily aim to maximize system- allocation types in these studies, emphasize the performance
wide performance metrics, such as throughput, latency, indicators and resource allocation optimization algorithms in
or energy efficiency. However, with the growing demand these studies, and provide detailed tables to summarize these
for personalized services and the increasing diversity of studies. We identify current research bottlenecks and chal-
user requirements, future resource allocation schemes must lenges in the allocation of SemCom resources and anticipate
prioritize individual user satisfaction. Despite its importance, further research in the future. We hope that our work can
transforming resource allocation into a user-centric paradigm provide references and insight to future researchers, as well
posessignificantchallenges.Oneofthebiggestobstaclesisthe as encourage follow-up research.
design of meaningful and measurable metrics that accurately
reflectusersatisfaction,asitrequiresaccountingforsubjective
ACKNOWLEDGMENT
factors such as preferences and context. Additionally, these
metricsneedtobedynamicandadaptabletovaryingscenarios, The authors would like to thank the anonymous reviewers
such as real-time changes in user behavior or network for their valuable comments and suggestions, which helped to
conditions. Another challenge lies in the inherent complexity improve the quality of this article.
of resource allocation to meet diverse and sometimes
conflictinguserneeds.Forexample,balancingthesatisfaction REFERENCES
of multiple users while ensuring the fairness and efficient
[1] C. E. Shannon and W. Weaver, The Mathematical Theory of
use of network resources requires advanced algorithms and
Communication.Urbana,IL,USA:Univ.IllinoisPress,1949.
computationally efficient solutions. Moreover, these resource [2] J.Baoetal.,“Towardsatheoryofsemanticcommunication,”inProc.
allocation algorithms must be scalable to accommodate the IEEENetw.Sci.Workshop,2011,pp.110117.
[3] Z.Qin,X.Tao,J.Lu,W.Tong,andG.Y.Li,“Semanticcommunica-
huge number of devices and users envisioned in 6G.
tions:Principlesandchallenges,”2022,arXiv:2201.01389.
2) Security and Privacy Issue: In existing research on [4] D. Gündüz et al., “Beyond transmitting bits: Context, semantics, and
SemCom resource allocation, security and privacy concerns task-orientedcommunications,”IEEEJ.Sel.AreasCommun.,vol.41,
no.1,pp.541,Jan.2023.
have not been adequately addressed. However, the failure
[5] X. Luo, H.-H. Chen, and Q. Guo, “Semantic communications:
of a SemCom model or an attack on the system can sig- Overview,openissues,andfutureresearchdirections,”IEEEWireless
nificantly undermine the reliability and robustness of the Commun.,vol.29,no.1,pp.210219,Feb.2022.
entire network, rendering resource allocation ineffective. It [6] Z.Luetal.,“Semantics-empoweredcommunications:Atutorial-cum-
survey,” IEEE Commun. Surveys Tuts., vol. 26, no. 1, pp.4179, 1st
is critical to develop mechanisms to enhance the robustness
Quart.,2024.
of the system and to formulate intrusion detection strategies [7] C.Zhang,H.Zou,S.Lasaulce,W.Saad,M.Kountouris,andM.Bennis,
to protect against vulnerabilities. In real-world applications “Goal-oriented communications for the IoT and application to data
compression,” IEEE Internet Things Mag., vol. 5, no. 4, pp.5863,
such as semantic-aware IoV, SemCom IIoT, 6G-envisioned
Dec.2022.
telemedicine,andtheMetaverse,largeamountsoftransmitted [8] S. Iyer et al., “A survey on semantic communications for intelli-
data often involve user privacy and even business-sensitive gent wireless networks,” Wireless Pers. Commun., vol. 129, no. 1,
pp.569611,Mar.2023.
information. If these data are exposed or leaked during trans-
[9] Y.Liu,X.Wang,Z.Ning,M.Zhou,L.Guo,andB.Jedari,“Asurvey
mission and processing, it could lead to substantial financial onsemanticcommunications:Technologies,solutions,applicationsand
and reputational losses. One promising approach to address challenges,”Digit.Commun.Netw.,vol.10,no.3,pp.528545,2024.
[10] M.KountourisandN.Pappas,“Semantics-empoweredcommunication
privacy issues is the application of federated learning (FL)
fornetworkedintelligentsystems,”IEEECommun.Mag.,vol.59,no.6,
in SemCom. By enabling devices to collaboratively train pp.96102,Jun.2021.
semantic extraction models without sharing raw data, FL [11] G.Shi,Y.Xiao,Y.Li,andX.Xie,“Fromsemanticcommunicationto
semantic-awarenetworking:Model,architecture,andopenproblems,”
helps preserve user privacy and reduces the risk of sensitive
IEEECommun.Mag.,vol.59,no.8,pp.4450,Aug.2021.
information leakage. This decentralized learning paradigm is [12] W. Yang et al., “Semantic communications for future Internet:
especially suitable for privacy-critical scenarios, where tradi- Fundamentals, applications, and challenges,” IEEE Commun. Surveys
Tuts.,vol.25,no.1,pp.213250,1stQuart.,2023.
tionalcentralizedtrainingmaynotbeviable.Therefore,thisis
[13] T.M.Getu,G.Kaddoum,andM.Bennis,“Makingsenseofmeaning:
an important future research direction. This research direction A survey on metrics for semantic and goal-oriented communication,”
is crucial for the scalability and trustworthiness of SemCom IEEEAccess,vol.11,pp.4545645492,2023.
[14] T. M. Getu, G. Kaddoum, and M. Bennis, “A survey on goal-
networks in the future, helping them meet the increasing
oriented semantic communication: Techniques, challenges, and future
demandsofemergingapplicationswithoutcompromisinguser directions,”IEEEAccess,vol.12,pp.5122351274,2024.
privacy or system performance. [15] D.Wonetal.,“Resourcemanagement,security,andprivacyissuesin
In this section, we discuss various challenges and future semantic communications: A survey,” IEEE Commun. Surveys Tuts.,
vol.27,no.3,pp.17581797,Jun.2025.
research directions for resource allocation in SemCom
[16] Q.Luo,S.Hu,C.Li,G.Li,andW.Shi,“Resourceschedulinginedge
networks. These challenges and their future directions are computing: A survey,” IEEE Commun. Surveys Tuts., vol. 23, no. 4,
summarized in Table XIV. pp.21312165,4thQuart.,2021.
[17] A. Sarah, G. Nencioni, and M. M. I. Khan, “Resource allocation in
multi-access edge computing for 5G-and-beyond networks,” Comput.
Netw.,vol.227,May2023,Art.no.109720.
VII. CONCLUSION [18] Naren, A. K. Gaurav, N. Sahu, A. P. Dash, G. Chalapathi, and
V. Chamola, “A survey on computation resource allocation in IoT
In this survey, we provide a systematic and comprehensive
enabled vehicular edge computing,” Complex Intell. Syst., vol. 8,
overview of the resource allocation problem in SemCom. We pp.36833705,Oct.2022.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
2998 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
[19] B.Bossy,P.Kryszkiewicz,andH.Bogucka,“Energy-efficientOFDM [44] Z. Hu, T. Liu, C. You, Z. Yang, and M. Chen, “Multiuser resource
radio resource allocation optimization with computational awareness: allocationforsemantic-relay-aidedtexttransmissions,”inProc.IEEE
Asurvey,”IEEEAccess,vol.10,pp.9410094132,2022. GlobecomWorkshops(GCWkshps),2023,pp.12731278.
[20] Y.Teng,M.Liu,F.R.Yu,V.C.M.Leung,M.Song,andY.Zhang, [45] T. Liu, C. You, Z. Hu, C. Wu, Y. Gong, and K. Huang, “Semantic-
“Resourceallocationforultra-densenetworks:Asurvey,someresearch relay-aided text transmission: Placement optimization and bandwidth
issues and challenges,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, allocation,”inProc.IEEEGlobecomWorkshops(GCWkshps),2023,
pp.21342168,3rdQuart.,2019. pp.215220.
[21] E. C. Strinati and S. Barbarossa, “6G networks: Beyond Shannon [46] Y. Lil, X. Zhou, and J. Zhao, “Resource allocation for semantic
towardssemanticandgoal-orientedcommunications,”Comput.Netw., communication under physical-layer security,” in Proc. IEEE Global
vol.190,no.8,pp.117,May2021. Commun.Conf.,2023,pp.20632068.
[22] L. Yan, Z. Qin, R. Zhang, Y. Li, and G. Y. Li, “QoE-aware resource [47] H. Hu, X. Zhu, F. Zhou, W. Wu, and R. Q. Hu, “Semantic-oriented
allocation for semantic communication networks,” in Proc. IEEE resource allocation for multi-modal UAV semantic communica-
GlobalCommun.Conf.,2022,pp.32723277. tion networks,” in Proc. IEEE Global Commun. Conf., 2023,
[23] N.Farsad,M.Rao,andA.Goldsmith,“Deeplearningforjointsource- pp.72137218.
channelcodingoftext,”inProc.IEEEInt.Conf.Acoust.,SpeechSignal [48] X. He, C. You, and T. Q. Quek, “Joint user association and resource
Process.(ICASSP),2018,pp.23262330. allocationformulti-cellnetworkswithadaptivesemanticcommunica-
[24] M. Rao, N. Farsad, and A. Goldsmith, “Variable length joint source tion,”2024,arXiv:2312.01049.
channelcodingoftextusingdeepneuralnetworks,”inProc.19thInt. [49] Y. Zheng,T. Zhang,R.Huang,andY.Wang, “Computingoffloading
WorkshopSignalProcessAdv.WirelessCommun.(SPAWC),Kalamata, and semantic compression for intelligent computing tasks in MEC
2018,pp.15. systems,”inProc.IEEEWirelessCommun.Netw.Conf.(WCNC),2023,
[25] H. Xie, Z. Qin, G. Y. Li, and B.-H. Juang, “Deep learning enabled pp.16.
semantic communication systems,” IEEE Trans. Signal Process., vol. [50] Z.JiandZ.Qin,“Energy-efficienttaskoffloadingforsemantic-aware
69,pp.26632675,2021. networks,”inProc.IEEEInt.Conf.Commun.,2023,pp.35843589.
[26] Q.Zhou,R.Li,Z.Zhao,C.Peng,andH.Zhang,“Semanticcommu- [51] M. Chen, Y. Wang, and H. V. Poor, “Performance optimization for
nicationwithadaptiveuniversaltransformer,”IEEEWirelessCommun. wireless semantic communications over energy harvesting networks,”
Lett.,vol.11,no.3,pp.453457,Mar.2022. in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP),
[27] A.Vaswanietal.,“Attentionisallyouneed,”inAdvancesinNeural 2022,pp.86478651.
InformationProcessingSystems,vol.30.RedHook,NY,USA:Curran
[52] O. Marnissi, H. E. Hammouti, and E. H. Bergou, “Semantic-aware
Assoc.,Inc.,2017.
resource allocation in constrained networks with limited user partici-
[28] S. Jiang et al., “Reliable semantic communication system enabled by
pation,”inProc.IEEEWirelessCommun.Netw.Conf.(WCNC),2024,
knowledgegraph,”Entropy,vol.24,no.6,p.846,2022.
pp.16.
[29] J.Liang,Y.Xiao,Y.Li,G.Shi,andM.Bennis,“Life-longlearningfor
[53] L. Wang, W. Wu, F. Zhou, Z. Yang, Z. Qin, and Q. Wu, “Adaptive
reasoning-based semantic communication,” in Proc. IEEE Int. Conf.
resource allocation for semantic communication networks,” IEEE
Commun.Workshops(ICCWorkshops),2022,pp.271276.
Trans.Commun.,vol.72,no.11,pp.69006916,Nov.2024.
[30] E. Bourtsoulatze, D. B. Kurka, and D. Gündüz, “Deep joint source-
[54] Y. Wang, M. Chen, W. Saad, T. Luo, S. Cui, and H. V. Poor,
channel coding for wireless image transmission,” IEEE Trans. Cogn.
“Performanceoptimizationforsemanticcommunications:Anattention-
Commun.Netw.,vol.5,no.3,pp.567579,Sep.2019.
based learning approach,” in Proc. IEEE Global Commun. Conf.
[31] C.Dong,H.Liang,X.Xu,S.Han,B.Wang,andP.Zhang,“Semantic
(GLOBECOM),2021,pp.16.
communication system based on semantic slice models propagation,”
[55] L.Wang,W.Wu,F.Tian,andH.Hu,“Intelligentresourceallocation
IEEEJ.Sel.AreasCommun.,vol.41,no.1,pp.202213,Jan.2023.
forUAV-enabledspectrumsharingsemanticcommunicationnetworks,”
[32] M.U.Lokumarambage,V.S.S.Gowrisetty,H.Rezaei,T.Sivalingam,
in Proc. IEEE 23rd Int. Conf. Commun. Technol. (ICCT), 2023,
N.Rajatheva,andA.Fernando,“Wirelessend-to-endimagetransmis-
pp.13591363.
sion system using semantic communications,” IEEE Access, vol. 11,
[56] G.Cheng,X.Wang,D.Li,R.Jiang,andY.Xu,“Resourceallocation
pp.3714937163,2023.
for multi-cell semantic communication based on deep reinforcement
[33] S.KadamandD.I.Kim,“Semanticcommunication-empoweredtraffic
learning,” in Proc. IEEE 23rd Int. Conf. Communication Technol.
managementusingvehiclecountprediction,”2023,arXiv:2307.12254.
(ICCT),2023,pp.528533.
[34] Z. Weng and Z. Qin, “Semantic communication systems for speech
[57] G.Ding,S.Liu,J.Yuan,andG.Yu,“JointURLLCtrafficscheduling
transmission,” IEEE J Sel Areas Commun, vol. 39, pp.24342444,
and resource allocation for semantic communication systems,” IEEE
Aug.2021.
Trans.WirelessCommun.,vol.23,no.7,pp.72787290,Jul.2024.
[35] Z.Weng,Z.Qin,andG.Y.Li,“Semanticcommunicationsforspeech
recognition,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), [58] W. Zhang,Y. Wang, M. Chen, T. Luo, andD. Niyato, “Optimization
2021,pp.16. ofimagetransmissioninsemanticcommunicationnetworks,”inProc.
[36] L.Yan,Z.Qin,R.Zhang,Y.Li,andG.Y.Li,“Resourceallocationfor IEEEGlobalCommun.Conf.,2022,pp.59655970.
textsemanticcommunications,”IEEEWirelessCommun.Lett.,vol.11, [59] Y. Cang et al., “Online resource allocation for semantic-aware edge
no.7,pp.13941398,Jul.2022. computing systems,” IEEE Internet Things J., vol. 11, no. 17,
[37] Z.Weng,Z.Qin,andX.Tao,“Task-orientedsemanticcommunications pp.2809428110,Sep.2024.
forspeechtransmission,”inProc.IEEE98thVeh.Technol.Conf.(VTC- [60] Y. Cang et al., “Resource allocation for semantic-aware mobile
Fall),2023,pp.15. edge computing systems,” in Proc. IEEE Globecom Workshops (GC
[38] Z.Weng,Z.Qin,X.Tao,C.Pan,G.Liu,andG.Y.Li,“Deeplearning Wkshps),2023,pp.15851590.
enabledsemanticcommunicationswithspeechrecognitionandsynthe- [61] H.Zhang,H.Wang,Y.Li,K.Long,andV.C.Leung,“Towardintel-
sis,” IEEE Trans. Wireless Commun., vol. 22, no. 9, pp.62276240, ligent resource allocation on task-oriented semantic communication,”
Sep.2023. IEEEWirelessCommun.,vol.30,no.3,pp.7077,Jun.2023.
[39] D. Huang, X. Tao, F. Gao, and J. Lu, “Deep learning-based image [62] M. Poposka, H. A. Suraweera, G. K. Karagiannidis, and
semanticcodingforsemanticcommunications,”inProc.IEEEGlobal Z.Hadzi-Velkov, “Semantic wireless networks with minimal energy
Commun.Conf.(GLOBECOM),2021,pp.16. consumption,” IEEE Commun. Lett., vol. 28, no. 8, pp.18941898,
[40] Y. Wang et al., “Performance optimization for semantic communica- Aug.2024.
tions: An attention-based reinforcement learning approach,” IEEE J. [63] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access
Sel.AreasCommun.,vol.40,no.9,pp.25982613,Sep.2022. for downlink communication systems: Bridging, generalizing, and
[41] F. Zhou, Y. Li, X. Zhang, Q. Wu, X. Lei, and R. Q. Hu, “Cognitive outperforming SDMA and NOMA,” EURASIP J. Wireless Commun.
semanticcommunicationsystemsdrivenbyknowledgegraph,”inProc. Netw.,vol.2018,no.1,p.133,May2018.
IEEEInt.Conf.Commun.,2022,pp.48604865. [64] Z. Zhao, Z. Yang, M. Chen, Z. Zhang, and H. V. Poor, “A joint
[42] W.Zhang,Y.Wang,M.Chen,T.Luo,andD.Niyato,“Optimizationof communication and computation design for probabilistic semantic
imagetransmissionincooperativesemanticcommunicationnetworks,” communications,” Entropy, vol. 26, no. 5, p. 394, 2024. [Online].
IEEETrans.WirelessCommun.,vol.23,no.2,pp.861873,Feb.2024. Available:https://www.mdpi.com/1099-4300/26/5/394
[43] J. Kang et al., “Personalized saliency in task-oriented semantic com- [65] Z.Zhaoetal.,“Multi-userprobabilisticsemanticcommunicationwith
munications: Image transmission and performance analysis,” IEEE J. semantic compression ratio optimization,” in Proc. IEEE Int. Conf.
Sel.AreasCommun.,vol.41,no.1,pp.186201,Jan.2023. Commun.Workshops(ICCWorkshops),2024,pp.16471652.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 2999
[66] Z. Zhao et al., “A joint communication and computation design for [87] Z. Yang, M. Chen, Z. Zhang, C. Huang, and Q. Yang, “Performance
distributedRIS-assistedprobabilisticsemanticcommunicationinIIoT,” optimizationofenergyefficientsemanticcommunicationsoverwireless
IEEEInternetThingsJ.,vol.11,no.16,pp.2656826579,Aug.2024. networks,” in Proc. IEEE 96thVeh. Technol. Conf. (VTC-Fall), 2022,
[67] Z.Yang,M.Chen,Z.Zhang,andC.Huang,“Energyefficientsemantic pp.15.
communicationoverwirelessnetworkswithratesplitting,”IEEEJ.Sel. [88] A.Xiao,K.Zhao,Z.Liu,andC.Liang,“Energyefficiencyinsemantic
AreasCommun.,vol.41,no.5,pp.14841495,May2023. networks:Aheuristicoptimizationapproachforresourceallocation,”in
[68] C. Zeng et al., “Task-oriented semantic communication over rate Proc.28thAsiaPacificConf.Commun.(APCC),2023,pp.219224.
splittingenabledwirelesscontrolsystemsforURLLCservices,”IEEE [89] L.ChenandJ.Gong,“Multi-sourceschedulingandresourceallocation
Trans.Commun.,vol.72,no.2,pp.722739,Feb.2024. forage-of-semantic-importanceoptimizationinstatusupdatesystems,”
[69] R.Xu,Z.Yang,Z.Zhao,Q.Yang,andZ.Zhang,“Resourceallocation inProc.IEEEWirelessCommun.Netw.Conf.(WCNC),2024,pp.16.
forgreenprobabilisticsemanticcommunicationwithratesplitting,”in [90] B.Hu,J.Ma,Z.Sun,J.Liu,R.Li,andL.Wang,“DRL-basedintel-
Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), 2024, ligent resource allocation for physical layer semantic communication
pp.20172022. withIRS,”Phys.Commun.,vol.63,Apr.2024,Art.no.102270.
[70] Z. Zhao et al., “Spectral efficiency Maximization for probabilistic [91] J. Dai, H. Fan, Z. Zhao, Y. Sun, and Z. Yang, “Secure resource
semanticcommunicationwithratesplitting,”inProc.IEEE99thVeh. allocationforintegratedsensingandsemanticcommunicationsystem,”
Technol.Conf.(VTC-Spring),2024,pp.15. inProc.IEEEInt.Conf.Commun.Workshops(ICCWorkshops),2024,
[71] Y.Chengetal.,“Resourceallocationandcommonmessageselection pp.12251230.
for task-oriented semantic information transmission with RSMA,” [92] J.X.Dai,H.Fan,Z.X.Zhaoetal.,“Jointcommunicationandcompu-
IEEE Trans. Wireless Commun., vol. 23, no. 6, pp.55575570, Jun. tationdesignforsecureintegratedsensingandsemanticcommunication
2024. system,”Sci.ChinaInf.Sci.,vol.68,no.3,2025,Art.no.132301.
[72] M. Lu, J. Huang, T. Yang, Y. Wang, J. Jiao, and Q. Zhang, [93] Y.Yang,M.Shikh-Bahaei,Z.Yang,C.Huang,W.Xu,andZ.Zhang,
“Utilitylossofinformation-optimalforsemanticempoweredRSMAin “Jointsemanticcommunicationandtargetsensingfor6Gcommunica-
satellite-integratedInternet,”IEEEInternetThingsJ.,vol.11,no.24, tionsystem,”2024,arXiv:2401.17108.
pp.4057240587,Dec.2024.
[94] Y.Zhang,J.Li,G.Mu,andX.Chen,“ADRL-basedresourceallocation
[73] N. G. Evgenidis et al., “Delay minimization for hybrid semantic- for IRS-enhanced semantic spectrum sharing networks,” EURASIP J.
Shannon communications,” in Proc. IEEE Wireless Commun. Netw. Adv.SignalProcess.,vol.2024,no.1,pp.117,2024.
Conf.(WCNC),2024,pp.16.
[95] Z.Shao,Q.Wu,P.Fan,N.Cheng,Q.Fan,andJ.Wang,“Semantic-
[74] J.Zhao,M.Chen,Z.Yang,C.You,andM.Chen,“Resourceallocation
aware resource allocation based on deep reinforcement learning
forsemanticrelayaidedwirelessnetworkswithprobabilitygraph,”in
for 5G-V2X HetNets,” IEEE Commun. Lett., vol. 28, no. 10,
Proc.IEEEInt.Conf.Commun.,2024,pp.53175322.
pp.24522456,Oct.2024.
[75] M. Zhang, R. Zhong, X. Mu, Y. Chen, and Y. Liu, “Resource man-
[96] Z.Shaoetal.,“Semantic-awarespectrumsharinginInternetofVehicles
agementforheterogeneoussemanticandbitcommunicationsystems,”
basedondeepreinforcementlearning,”IEEEInternetThingsJ.,vol.11,
inProc.IEEEInt.Conf.Commun.Workshops(ICCWorkshops),2023,
no.23,pp.3852138536,Dec.2024.
pp.16291634.
[97] L.Xia,Y.Sun,X.Li,G.Feng,andM.A.Imran,“Wirelessresource
[76] H.Noh,S.Park,andH.J.Yang,“Deepreinforcementlearning-based
managementinintelligentsemanticcommunicationnetworks,”inProc.
resourceallocationandmodeselectionforsemanticcommunication,”
IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS),
inProc.22ndInt.Symp.Model.Optim.Mobile,AdHoc,WirelessNetw.
2022,pp.16.
(WiOpt),2024,pp.16.
[98] L.Xia,Y.Sun,D.Niyato,X.Li,andM.A.Imran,“Jointuserassoci-
[77] P. Li, Y. Wang, M. Liu, and H. Liu, “Matching game based resource
ationandbandwidthallocationinsemanticcommunicationnetworks,”
allocation scheme for adaptive semantic and bit communication
IEEETrans.Veh.Technol.,vol.73,no.2,pp.26992711,Feb.2024.
networks,”inProc.IEEE99thVeh.Technol.Conf.(VTC-Spring),2024,
[99] X. Jia, X. Wang, Y. Zhang, M. Sheng, and G. Cheng, “Resource
pp.17.
allocation for multi-cell semantic communication systems based on
[78] L. Xia, Y. Sun, D. Niyato, L. Zhang, and M. A. Imran,
DRL,”inProc.12thInt.Conf.Inf.Syst.Comput.Technol.(ISCTech),
“Wirelessresourceoptimizationinhybridsemantic/bitcommunication
2024,pp.16.
networks,” IEEE Trans. Commun., vol. 73, no. 5, pp. 33183332,
[100] L. Li, J. Dai, Z. Yang, Q. Yang, C. Huang, and Z. Zhang, “Joint
May2025.
compression ratio and user association for multi-cell probabilistic
[79] J. Li, H. Gao, T. Lv, and Y. Lu, “Deep reinforcement learning based
semantic communication,” in Proc. IEEE/CIC Int. Conf. Commun.
computation offloading and resource allocation for MEC,” in Proc.
China(ICCCWorkshops),2024,pp.645650.
IEEEWirelessCommun.Netw.Conf.(WCNC),2018,pp.16.
[101] X. Pu, T. Lei, W. Wen, and Q. Chen, “Enhancing communication
[80] Y. Liu, H. Yu, S. Xie, and Y. Zhang, “Deep reinforcement learning
efficiency of semantic transmission via joint processing technique,”
for offloading and resource allocation in vehicle edge comput-
IEEECommun.Lett.,vol.28,no.3,pp.657661,Mar.2024.
ing and networks,” IEEE Trans. Veh. Technol., vol. 68, no. 11,
pp.1115811168,Nov.2019. [102] J.Suetal.,“Semanticcommunication-baseddynamicresourcealloca-
[81] S. Wang, T. Lv, W. Ni, N. C. Beaulieu, and Y. J. Guo, “Joint tion in d2d vehicular networks,” IEEE Trans. Veh. Technol., vol. 72,
resource management for MC-NOMA: A deep reinforcement learn- no.8,pp.1078410796,Aug.2023.
ing approach,” IEEE Trans. Wireless Commun., vol. 20, no. 9, [103] L.Wang,W.Wu,F.Zhou,Z.Qin,andQ.Wu,“IRS-enhancedsecure
pp.56725688,Sep.2021. semantic communication networks: Cross-layer and context-awared
[82] R. Lin, C. Guo, J. Chen, and Y. Wang, “Multidimensional resource resource allocation,” IEEE Trans. Wireless Commun., vol. 24, no. 1,
jointallocationalgorithmbasedondeepdoubleQnetworkinsemantic pp.494508,Jan.2025.
communication, (in Chinese),” Mobile Commun., vol. 47, no. 4, [104] X. Xu, C. He, X. Li, and J. Xu, “Joint optimization trajectory and
pp.4553,2023. resourceallocationforUAV-assistedsemanticcommunications,”Phys.
[83] H. Wang, L. Wang, and W. Wu, “Resource allocation and intelli- Commun.,vol.68,Feb.2025,Art.no.102555.
genttrajectoryoptimizationforUAV-assistedsemanticcommunication [105] Y. Li, X. Zhou, and J. Zhao, “Resource allocation for the training
system,” in Proc. IEEE 23rd Int. Conf. Commun. Technol. (ICCT), of image semantic communication networks,” IEEE Trans. Wireless
2023,pp.13701374. Commun.,vol.24,no.4,pp.29682984,Apr.2025.
[84] Z. Zhao, Z. Yang, Q.-V. Pham, Q. Yang, and Z. Zhang, “Semantic [106] C. Liu, C. Guo, and Y. Yang, “Performance optimization for task-
communication with probability graph: A joint communication and oriented communications,” in Proc. IEEE Int. Conf. Commun., 2024,
computation design,” in Proc. IEEE 98th Veh. Technol. Conf. (VTC- pp.968973.
Fall),2023,pp.15. [107] J. Liu, Y. Lu, H. Wu, and Y. Dai, “Efficient resource allocation
[85] Z.Q.Liew,Y.Cheng,W.Y.B.Lim,D.Niyato,C.Miao,andS.Sun, and semantic extraction for federated learning empowered vehicular
“Economics of semantic communication system in wireless powered semantic communication,” in Proc. IEEE 98th Veh. Technol. Conf.
Internet of Things,” in Proc. IEEE Int. Conf. Acoust., Speech Signal (VTC-Fall),2023,pp.15.
Process.(ICASSP),2022,pp.86378641. [108] X.Xiang,X.Li,Q.Cui,X.Zhang,andX.Tao,“EoSI-awareresource
[86] Q. Cai et al., “Query-aware semantic encoder-based resource alloca- allocationforsemanticcommunication-enabledindustrialIoTsystem,”
tion in task-oriented communications,” IEEE Trans. Mobile Comput., inProc.Int.Conf.WirelessCommun.SignalProcess.(WCSP),2023,
vol.24,no.7,pp.64136429,Jul.2025. pp.477483.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
3000 IEEECOMMUNICATIONSSURVEYS&TUTORIALS,VOLUME28,2026
[109] Y. Wang et al., “Feature importance-aware task-oriented semantic [131] C. Feng, K. Zheng, Y. Wang, K. Huang, and Q. Chen, “Goal-
transmission and optimization,” IEEE Trans. Cogn. Commun. Netw., orientedwirelesscommunicationresourceallocationforcyber-physical
vol.10,no.4,pp.1175-1189,Aug.2024. systems,” IEEE Trans. Wireless Commun., vol. 23, no. 11,
[110] G. Liu, H. Du, D. Niyato, J. Kang, Z. Xiong, and B. H. Soong, pp.1576815783,Nov.2024.
“Vision-based semantic communications for metaverse services: A [132] Z.Zhao,Z.Yang,Q.Yang,C.Huang,M.Shikh-Bahaei,andZ.Zhang,
contest theoretic approach,” in Proc. IEEE Global Commun. Conf., “Sum rate maximization for distributed riss assisted probabilistic
2023,pp.24262432. semantic communication,” in Proc. IEEE 34th Int. Workshop Mach.
[111] C.Liu,C.Guo,Y.Yang,andN.Jiang,“Adaptablesemanticcompres- Learn.SignalProcess.(MLSP),2024,pp.16.
sionandresourceallocationfortask-orientedcommunications,”IEEE [133] K.Brunnströmetal.,“QualiNetwhitepaperondefinitionsofquality
Trans.Cogn.Commun.Netw.,vol.10,no.3,pp.769782,Jun.2024. of experience,” presented at Eur. Netw. Qual. Exp. Multimedia Syst.
[112] H.Zhang,H.Wang,Y.Li,K.Long,andA.Nallanathan,“DRL-driven Services(COSTActionIC1003),2013.
dynamic resource allocation for task-oriented semantic communica- [134] N. Banovic´-C´urguz and D. Iliševic´, “Mapping of QoS/QoE in 5G
tion,”IEEETrans.Commun.,vol.71,no.7,pp.39924004,Jul.2023. networks,” in Proc. 42nd Int. Conv. Inf. Commun. Technol., Electron.
[113] B. Du et al., “YOLO-based semantic communication with generative Microelectron.(MIPRO),2019,pp.404408.
AI-aided resource allocation for digital twins construction,” IEEE [135] A. Takahashi, “Framework and standardization of quality of experi-
InternetThingsJ.,vol.11,no.5,pp.76647678,Mar.2024. ence (QoE) design and management for audiovisual communication
[114] J.Zheng,B.Du,H.Du,J.Kang,D.Niyato,andH.Zhang,“Energy- services,”NTTTech.Rev.,vol.7,no.4,pp.15,2009.
efficient resource allocation in generative AI-aided secure semantic
[136] M.I.Belghazietal.,“Mutualinformationneuralestimation,”inProc.
mobile networks,” IEEE Trans. Mobile Comput., vol. 23, no. 12,
Int.Conf.Mach.Learn.,Stockholm,Sweden,Jul.2018,pp.531540.
pp.1142211435,Dec.2024.
[137] R. Kneser and H. Ney, “Improved backing-off for m-gram language
[115] W. C. Ng, H. Du, W. Y. B. Lim, Z. Xiong, D. Niyato, and C. Miao,
modeling,” in Proc. IEEE Int. Conf. Acoust. Speech, Signal Process.,
“Stochasticresourceallocationforsemanticcommunication-aidedvir-
1995,pp.181184.
tualtransportationnetworksinthemetaverse,”inProc.IEEEWireless
[138] M. E. Peters et al., “Deep contextualized word representations,” in
Commun.Netw.Conf.(WCNC),2024,pp.16.
Proc.NorthAmer.ChapterAssoc.Comput.Linguist.Hum.Lang.Tech.,
[116] H. Saadat, A. Albaseer, M. Abdallah, A. Mohamed, and A. Erbad,
Jun.2018,pp.22272237.
“Energy-aware service offloading for semantic communications in
wireless networks,” in Proc. IEEE Int. Conf. Commun., 2024, [139] S. Banerjee and A. Lavie, “METEOR: An automatic metric for MT
pp.54675472. evaluationwithimprovedcorrelationwithhumanjudgments,”inProc.
[117] X.Sun,J.Chen,andC.Guo,“Semantic-drivencomputationoffloading ACL Workshop Intrinsic Extrinsic Eval. Meas. Mach. Transl. /Or
andresourceallocationforUAV-assistedmonitoringsysteminvehic- Summarization,2005,pp.6572.
ular networks,” in Proc. 48th Annu. Conf. IEEE Ind. Electron. Soc., [140] A. Radford et al., “Learning transferable visual models from natural
2022,pp.16. languagesupervision,”2021,arXiv:2103.00020.
[118] Y. Zheng, T. Zhang, and J. Loo, “Dynamic multi-time scale user [141] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image
admission and resource allocation for semantic extraction in MEC qualityassessment:Fromerrorvisibilitytostructuralsimilarity,”IEEE
systems,”IEEETrans.Veh.Technol.,vol.72,no.12,pp.1644116453, Trans.ImageProcess.,vol.13,pp.600612,2004.
Dec.2023. [142] Y.Ao,Y.Li,S.He,D.Chen,Z.Qin,andX.Tao,“Researchonresource
[119] X. Han, B. Feng, Y. Shi, Y. Wu, and W. Zhang, “Semantic- allocationincellularsemanticcommunicationsystems,(inChinese),”
aware resource allocation for wireless image transmission,” in Proc. MobileCommun.,vol.48,no.2,pp.104110,2024.
IEEE/CICInt.Conf.Commun.China(ICCC),2024,pp.20712076. [143] K. Niu et al., “A paradigm shift toward semantic communications,”
[120] X. Yang, H. Yang, Y. Jiang, A. Alphones, and L. Xiao, “Game- IEEECommun.Mag.,vol.60,no.11,pp.113119,Nov.2022.
guidedmatchingtheory-basedresourceallocationforsecuresemantic [144] S. Kadam and D. I. Kim, “Knowledge-aware semantic communi-
communications,” IEEE Trans. Veh. Technol., vol. 74, no. 5, cation system design,” in Proc. IEEE Int. Conf. Commun., 2023,
pp.83578362,May2025. pp.61026107.
[121] L. Yan, Z. Qin, C. Li, R. Zhang, Y. Li, and X. Tao, “QoE-based [145] H. Xie, Z. Qin, X. Tao, and K. B. Letaief, “Task-oriented multi-user
semantic-aware resource allocation for multi-task networks,” IEEE semanticcommunications,”IEEEJ.Sel.AreasCommun.,vol.40,no.9,
Trans.WirelessCommun.,vol.23,no.9,pp.1195811971,Sep.2024. pp.25842597,Sep.2022.
[122] C. Huang, X. Chen, G. Chen, P. Xiao, G. Y. Li, and W. Huang, [146] Y. Wang et al., “A survey on metaverse: Fundamentals, security, and
“Deepreinforcementlearning-basedresourceallocationforhybridbit privacy,” IEEE Commun. Surveys Tuts., vol. 25, no. 1, pp.319352,
andgenerativesemanticcommunicationsinspace-air-groundintegrated Jan.2023.
networks,”2024,arXiv:2412.05647. [147] H.Duetal.,“Attention-awareresourceallocationandQoEanalysisfor
[123] Z. Shao et al., “Semantic-aware resource management for C- metaverse xURLLC services,” IEEE J. Sel. Areas Commun., vol. 41,
V2X platooning via multi-agent reinforcement learning,” 2024, no.7,pp.21582175,Jul.2023.
arXiv:2411.04672.
[148] H. Du et al., “Exploring attention-aware network resource allocation
[124] J. Chen, C. Feng, C. Guo, Y. Yang, Q. Sun, and M. Zhu, “Video
for customized metaverse services,” IEEE Netw., vol. 37, no. 6,
semantics-drivenresourceallocationalgorithminInternetofVehicles,
pp.166175,Nov.2023.
(inChinese),”J.Commun.,vol.42,no.7,pp.111,2021.
[149] A. Kosta, N. Pappas, and V. Angelakis, “Age of information: A new
[125] R. Lin, C. Guo, B. Zhang, J. Chen, and H. Li, “Tasks-oriented concept, metric, and tool,” Found. Trends(cid:2)R Netw., vol. 12, no. 3,
channeloptimizationandresourceallocationinvehicularnetworks:A
pp.162259,2017.
hierarchicalreinforcementlearningbasedapproach,”IEEETrans.Veh.
[150] S. Guo, Y. Wang, S. Li, and N. Saeed, “Semantic importance-aware
Technol.,vol.74,no.5,pp.76247636,May2025.
communications using pre-trained language models,” IEEE Commun.
[126] F. Zhao, G. Bagwe, E. Mohammed, L. Feng, L. Zhang, and Y. Sun,
Lett.,vol.27,no.9,pp.23282332,Sep.2023.
“Joint computing resource and bandwidth allocation for semantic
communication networks,” in Proc. IEEE 98th Veh. Technol. Conf. [151] S.KadamandD.I.Kim,“Knowledge-awaresemanticcommunication
(VTC-Fall),2023,pp.15. systemdesignanddataallocation,”IEEETrans.Veh.Technol.,vol.73,
[127] Y. Zhu, X. Yuan, Y. Hu, and A. Schmeink, “Semantic reliability no.4,pp.57555769,Apr.2024.
Maximization:Acooperativeperspectiveinintegratedsensing,commu- [152] M. Noor-A-Rahim, Z. Liu, H. Lee, G. G. M. N. Ali, D. Pesch, and
nication and computation networks,” in Proc. IEEE Global Commun. P.Xiao,“Asurveyonresourceallocationinvehicularnetworks,”IEEE
Conf.,2023,pp.50735079. Trans.Intell.Transp.Syst.,vol.23,no.2,pp.701721,Feb.2022.
[128] S. Liang et al., “Fair resource allocation for probabilistic semantic [153] H. W. Kuhn, “The Hungarian method for the assignment problem,”
communicationinIloT,”inProc.IEEE/CICInt.Conf.Commun.China Nav.Res.LogisticsQuart.,vol.2,nos.12,pp.8397,1955.
(ICCCWorkshops),2024,pp.242247. [154] Z. Zhou, Y. Guo, Y. He, X. Zhao, and W. M. Bazzi, “Access
[129] H.Chen,F.Fang,andX.Wang,“Semanticextractionmodelselection controlandresourceallocationforM2Mcommunicationsinindustrial
for IoT devices in edge-assisted semantic communications,” IEEE automation,”IEEETrans.Ind.Informat.,vol.15,no.5,pp.30933103,
Commun.Lett.,vol.28,no.7,pp.17331737,Jul.2024. May2019.
[130] S. Hua et al., “Optimizing spectral efficiency through bandwidth [155] Z. Yu, Y. Gong, S. Gong, and Y. Guo, “Joint task offloading and
managementinsemanticcommunicationsystems,”inProc.IEEEInt. resource allocation in UAV-enabled mobile edge computing,” IEEE
Conf.Commun.Workshops(ICCWorkshops),2024,pp.16351640. InternetThingsJ.,vol.7,no.4,pp.31473159,Apr.2020.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.
---PAGE BREAK---
ZHANGetal.:RESOURCEALLOCATIONINWIRELESSSem-Com:ACOMPREHENSIVESURVEY 3001
[156] H.Zhang,N.Yang,W.Huangfu,K.Long,andV.C.M.Leung,“Power [176] P.Dütting,Z.Feng,H.Narasimhan,D.Parkes,andS.S.Ravindranath,
control based on deep reinforcement learning for spectrum sharing,” “Optimal auctions through deep learning,” in Proc. Int. Conf. Mach.
IEEE Trans. Wireless Commun., vol. 19, no. 6, pp.42094219, Learn.,2019,pp.17061715.
Jun.2020. [177] R. Carnap and Y. Bar-Hillel, “An outline of a theory of seman-
[157] Z.Ding,R.Schober,andH.V.Poor,“No-painno-gain:DRLassisted tic information,” Res. Lab. Electron., Massachusetts Inst. Technol.,
optimizationinenergy-constrainedCR-NOMAnetworks,”IEEETrans. Cambridge,MA,USA,Rep.247,Oct.1952.
Commun.,vol.69,no.9,pp.59175932,Sep.2021. [178] B. Güler, A. Yener, and A. Swami, “The semantic communication
[158] C.J.C.H.WatkinsandP.Dayan,“Q-learning,”Mach.Learn.,vol.8, game,”IEEETrans.Cogn.Commun.Netw.,vol.4,no.4,pp.787802,
pp.279292,May1992. Dec.2018.
[159] V. Mnih et al., “Human-level control through deep reinforcement [179] J. Konecˇny`, B. McMahan, and D. Ramage, “Federated
learning,”Nature,vol.518,no.7540,pp.529533,2015. optimization: Distributed optimization beyond the datacenter,” 2015,
[160] L.-J. Lin, “Self-improving reactive agents based on reinforcement arXiv:1511.03575.
learning, planning and teaching,” Mach. Learn., vol. 8, nos. 34,
pp.293321,1992.
[161] Y. Li, “Deep reinforcement learning: An overview,” 2017,
arXiv:1701.07274.
[162] H.vanHasselt,A.Guez,andD.Silver,“Deepreinforcementlearning ChujunZhangreceivedtheB.E.degreeincommu-
with double Q-learning,” in Proc. AAAI Conf. Artif. Intell. (AAAI), nication engineering from the School of Electrical
2016,pp.20942100. Engineering and Information, Southwest Petroleum
[163] H.V.Hasselt,“Doublelearning,”inProc.24thAnnu.Conf.NeuralInf. University, Chengdu, China, in 2023. He is cur-
Process.Syst.,2010,pp.26132616. rently pursuing the M.Sc. degree in information
[164] Z.Wang,T.Schaul,M.Hessel,H.Hasselt,M.Lanctot,andN.Freitas, andcommunicationengineeringwiththeCollegeof
“Dueling network architectures for deep reinforcement learning,” in Electronics and Information Engineering, Sichuan
Proc.Int.Conf.Mach.Learn.,2016,pp.19952003. University,Chengdu.
[165] R.S.Sutton,D.McAllester,S.Singh,andY.Mansour,“Policygradient His current research interests include wireless
methods for reinforcement learning with function approximation,” in communications, semantic communications, and
Proc.Adv.NeuralInf.Process.Syst.,vol.12,1999,pp.17. resourceallocation.
[166] D. Silver, G. Lever, N. Heess, T. Degris, D. Wierstra, and
M.Riedmiller,“Deterministicpolicygradientalgorithms,”inProc.Int.
Conf.Mach.Learn.(ICML),2014,pp.19.
[167] T. P. Lillicrap et al., “Continuous control with deep reinforcement Linyu Huang (Member, IEEE) received the B.E.
learning,”inProc.Int.Conf.Learn.Represent.(ICLR),2016,pp.110. degree in electronic information engineering from
[168] S.Fujimoto,H.Hoof,andD.Meger,“Addressingfunctionapproxima- theUniversityofElectronicScienceandTechnology
tion error in actor-critic methods,” in Proc. Int. Conf. Mach. Learn., of China, Chengdu, China, in 2008, and the Ph.D.
2018,pp.15871596. degree in electronic engineering from the City
[169] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov, UniversityofHongKongin2014.Hejoinedthefac-
“Proximalpolicyoptimizationalgorithms,”2017,arXiv:1707.06347. ultywiththeCollegeofElectronicsandInformation
[170] T.Haarnoja,A.Zhou,P.Abbeel,andS.Levine,“Softactor-critic:Off- Engineering,SichuanUniversity,Chengdu,in2014.
policymaximumentropydeepreinforcementlearningwithastochastic Hiscurrentresearchinterestsincludewirelesscom-
actor,”inProc.Int.Conf.Mach.Learn.,2018,pp.18611870. munication,signalprocessing,andmachinelearning.
[171] S. Mirjalili and A. Lewis, “The whale optimization algorithm,” Adv.
Eng.Softw.,vol.95,pp.5167,May2016.
[172] Y.Gu,W.Saad,M.Bennis,M.Debbah,andZ.Han,“Matchingtheory
for future wireless networks: Fundamentals and applications,” IEEE
Commun.Mag.,vol.53,no.5,pp.5259,May2015. Qian Ning received the bachelors degree from
[173] C.Yuetal.,“ThesurprisingeffectivenessofPPOincooperativemulti- XidianUniversityin1990,themastersdegreefrom
agentgames,”inProc.Adv.NeuralInf.Process.Syst.,vol.35,2022, theUniversityofElectronicScienceandTechnology
pp.2461124624. ofChinain1997,andthePh.D.degreefromSichuan
[174] S.Bayat,Y.Li,L.Song,andZ.Han,“Matchingtheory:Applicationsin University, Chengdu, China, in 2006, where she is
wirelesscommunications,”IEEESignalProcess.Mag.,vol.33,no.6, currently an Associate Professor with the College
pp.103122,Nov.2016. of Electronics and Information Engineering. Her
[175] Y. Zhang, C. Lee, D. Niyato, and P. Wang, “Auction approaches for currentresearchinterestsincludeintelligentsystems
resource allocation in wireless systems: A survey,” IEEE Commun. andwirelessadhocnetworks.
SurveysTuts.,vol.15,no.3,pp.10201041,3rdQuart.,2013.
Authorized licensed use limited to: WUHAN UNIVERSITY OF TECHNOLOGY. Downloaded on February 09,2026 at 07:23:36 UTC from IEEE Xplore. Restrictions apply.