Next Article in Journal
Screen Printing Conductive Inks on Textiles: Impact of Plasma Treatment
Previous Article in Journal
Converging Minds: EEG Synchrony During Communication About Moral Decision-Making in Dyadic Interactions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities

by
Tingyue Xue
,
Wenhao Lu
,
Mianyi Zhang
,
Yinghui He
,
Yunlong Cai
and
Guanding Yu
*
College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(13), 4238; https://doi.org/10.3390/s25134238
Submission received: 24 April 2025 / Revised: 20 June 2025 / Accepted: 5 July 2025 / Published: 7 July 2025
(This article belongs to the Section Communications)

Abstract

Integrated sensing and communication (ISAC) has attracted extensive attention as a key technology to improve spectrum utilization and system performance for future wireless sensor networks. At the same time, active surveillance, as a legitimate means of surveillance, can improve the success rate of surveillance by sending interference signals to suspicious receivers, which is important for crime prevention and public safety. In this paper, we investigate the joint optimization of performance of both ISAC and active surveillance. Specifically, we formulate a bilevel optimization problem where the upper-level objective aims to maximize the probability of successful eavesdropping while the lower-level objective aims to optimize the localization performance of the radar on suspicious transmitters. By employing the Rayleigh quotient, introducing a decoupling strategy, and adding penalty terms, we propose an algorithm to solve the bilevel problem where the lower-level objective is convex. With the help of the proposed algorithm, we obtain the optimal solution of the analog transmit beamforming matrix and the digital beamforming vector. Performance analysis and discussion of key insights, such as the trade-off between eavesdropping success probability and radar localization accuracy, are also provided. Finally, comprehensive simulation results validate the effectiveness of our proposed algorithm in enhancing both the eavesdropping success probability and the accuracy of radar localization.

1. Introduction

The field of integrated sensing and communication (ISAC) marks a major advancement in wireless technology, combining wireless communication and radar sensing capabilities to enhance spectral efficiency and improve spatial–temporal resolution of signals. This integration is particularly crucial with the advent of future 6G technologies, where ISAC plays a pivotal role in high-speed data transmission and precise monitoring, especially in applications such as autonomous driving, wireless sensing and intelligent transportation systems [1]. However, in the realm of wireless communication, the open nature of the wireless medium makes it inherently susceptible to security vulnerabilities. Proactive eavesdropping, a legitimate and strategic form of surveillance, has become an essential capability for government agencies. Unlike passive eavesdropping, which can be limited by geographical factors or channel conditions, proactive eavesdropping involves the eavesdropper actively transmitting interference signals towards the target receiver to enhance the chances of successful interception. This approach holds practical application prospects, such as in vehicles or drones equipped with legal eavesdropping devices [2].
Building upon this, several studies have examined the integration of security measures within ISAC systems, addressing the simultaneous optimization of both communication and sensing functionalities. The authors of ref. [3] explore the use of Reconfigurable Intelligent Surfaces (RISs) to enhance the physical layer security (PLS) of wireless systems with ISAC. The paper discusses how RISs can mitigate threats like eavesdropping by intelligently manipulating the propagation of signals. However, while it emphasizes communication security, the interaction between communication security and radar sensing within ISAC systems still remains unexplored. Additionally, the authors of ref. [4] focus on a secure cell-free ISAC system, where both communication and sensing are subject to eavesdropping. The authors optimize beamforming strategies to ensure the security of both communication and sensing tasks. However, they treat these two objectives separately, making it difficult to efficiently coordinate the resources and balance both goals. In parallel, the authors of ref. [5] investigate a full-duplex ISAC system, where they jointly optimize beamforming and artificial noise to secure communications against eavesdroppers while simultaneously sensing them. However, their defensive framework aims to guarantee secrecy rates, which contrasts with our goal of proactively maximizing the eavesdropping probability. Additionally, the authors of ref. [6] study the integration of communication and sensing in ISAC networks for 6G. While it highlights the challenges of securing both communication and sensing functionalities, it does not provide a comprehensive solution for jointly optimizing both objectives. The authors suggest that while communication security and sensing can complement each other, an optimal framework to manage both simultaneously is still lacking.
Therefore, although these works address various aspects of ISAC security, they generally treat communication and sensing security as independent objectives. This approach may lead to difficulties in effectively balancing the dual goals, especially in mission-critical scenarios where both communication and sensing accuracy are essential. In particular, existing methods fail to efficiently allocate resources between eavesdropping prevention and radar localization, making it challenging to optimize both aspects simultaneously.
To address these limitations, bilevel optimization steps in as a powerful tool for solving multi-objective optimization problems [7]. In recent years, bilevel optimization has been adopted in several communication systems, particularly in the context of ISAC. For example, He et al. [8] utilize the bilevel optimization to optimize communication quality-of-service (QoS) and radar detection simultaneously, with the upper level focusing on communication performance and the lower level handling radar interference. Similarly, in [9], the authors consider an RIS-assisted SWIPT system, where bilevel optimization separates communication and power harvesting into two levels—maximizing information delivery at the upper level and harvested power at the lower level. This approach effectively balances the two objectives, optimizing overall system performance.
Building on these insights, our paper introduces a bilevel optimization approach that effectively coordinates communication security and radar sensing in ISAC systems. Specifically, we propose a system where a full-duplex legitimate monitor, equipped with a large-scale antenna array, uses hybrid beamforming to simultaneously perform proactive eavesdropping and radar sensing. The optimization focuses on maximizing the eavesdropping success probability while ensuring high radar localization accuracy. To achieve this, we first transform the eavesdropping success probability into a deterministic signal-to-interference-plus-noise ratio (SINR) difference and simplify the problem using Rayleigh quotient transformation. We then decouple the optimization problem and introduce penalty terms to handle non-convex components. The solution is derived by optimizing the beamforming vectors for both eavesdropping and radar tasks under certain system constraints. Furthermore, we discuss the simulation results, which demonstrate the effectiveness of our proposed approach in balancing both eavesdropping and radar performances.
We summarize our main contributions of this paper as follows:
We present a comprehensive system model for proactive ISAC surveillance, characterizing the distinct signal flows for eavesdropping, radar sensing, and jamming within a unified full-duplex architecture.
We formulate a mathematical optimization problem that maximizes the eavesdropping success probability while maintaining radar positioning accuracy. To solve this problem, we introduce a decoupling framework with penalty terms to handle non-convex components, enabling effective bilevel optimization of the problem’s convex objectives.
We conduct a detailed analysis of the influence of factors such as noise power and antenna number on both the upper and lower-level objectives. Through simulations, we demonstrate that our bilevel algorithm not only achieves high radar localization accuracy but also maintains a comparable eavesdropping probability to existing benchmark methods.
The rest of this paper is structured as follows. Section 2 presents the system model and formulates the mathematical optimization for integrated surveillance and radar sensing. In Section 3, the optimal algorithm is introduced for dealing with the formulated problem. In Section 4, numerical results are presented to validate the effectiveness of the proposed algorithm. Finally, Section 5 concludes the whole paper.
Notations: In this paper, scalars, vectors, and matrices are denoted by lowercase letters (e.g., x), bold lowercase letters (e.g., x ), and bold uppercase letters (e.g., X ), respectively. The operators ( · ) * , ( · ) T , and  ( · ) H represent the complex conjugate, transpose, and Hermitian (complex conjugate transpose), respectively. Given a matrix A , the notation A stands for its Frobenius norm. The set C m × n denotes the space of complex matrices of size m × n , and  I stands for the identity matrix. The notation CN ( μ , Σ ) indicates a circularly symmetric complex Gaussian distribution with mean vector μ and covariance matrix Σ . The expectation and probability operators are denoted by E { · } and P ( · ) , respectively.

2. System Model and Problem Formulation

In this section, we present the system model for wireless legitimate surveillance with radar capabilities and establish the optimization problem.

2.1. System Model

We consider a legitimate surveillance system that includes a suspicious transmitter S, a suspicious receiver D, and a legitimate monitor E as shown in Figure 1 [10]. It is important to note that the term “legitimate monitor” as used in this paper presupposes that the operating entity has been granted the legal authority to conduct such proactive jamming and surveillance activities. An analysis of the specific national statutes and regulatory frameworks that grant this authority—such as 47 U.S.C. § 333 of the Communications Act in the United States [11] or the Regulation of Investigatory Powers Act 2000 in the United Kingdom [12]—is beyond the technical scope of this work. Our focus remains on the signal processing and optimization challenges that arise under the fundamental assumption of a legally sanctioned operation. In this system, the transmitter S and suspicious receiver D are each equipped with a single antenna to transmit and receive the signals. The legitimate monitor E is equipped with N antennas and M radio frequency (RF) chains ( M N ), where N antennas are used for both transmitting and receiving signals. E intends to actively eavesdrop on suspicious transmissions between transmitter S and receiver D. To enhance the eavesdropping performance, E operates in the full-duplex (FD) mode, allowing it to simultaneously eavesdrop on the communication while interfering with the transmission between S and D. This interference is intentionally introduced by E to degrade the communication quality at D, which results in a lower SINR at D and, consequently, improves E’s ability to eavesdrop on the transmission. By reducing D’s SINR, E effectively boosts its own SINR and enhances eavesdropping performance.
Additionally, since the legitimate monitor can make contributions to legitimate monitoring in all kinds of ways, such as tracking suspicious users, detecting potential obstacles, or assisting in communication, we assume that the legitimate monitor operates as a phased-array radar, continuously transmitting detection signals in N directions of 180° during the scanning period. Each of these directions corresponds to one of the N beams generated by E’s radar system. Let h s e C N × 1 , h s d C 1 × 1 , and  h e d C N × 1 denote the eavesdropping channel, suspicious channel, and interference channel, respectively.
Regarding the transmitting module, we consider two types of signals: the suspicious signal and the interference signal. The suspicious signal is the communication signal transmitted from the suspicious transmitter S to the suspicious receiver D, which E is trying to eavesdrop on, and this signal can be written as U ˜ n H h s e p s s ( l ) , where s ( l ) is the baseband signal transmitted by S, p s is the transmit power, h s e is the channel from S to E, and  U ˜ n is the analog receive beamforming matrix at direction θ n . This is the target signal that E aims to recover during eavesdropping. The interference signal, on the other hand, is intentionally generated by E to degrade D’s reception quality. The legitimate monitor detects N directions consecutively in one scan cycle, probing one direction at a time. One RF chain is used for radar detection in each direction, while the remaining M 1 RF chains are used to generate interference to disturb D’s signal reception. Upon detecting the n-th direction, the transmitted signal at angle θ n can be written as
x n ( l ) = U n p n , l c n ( l ) ,
where c n ( l ) refers to the transmitted signal sequence with E { | c n ( l ) | 2 } = 1 . This signal sequence serves as the common carrier for both the radar detection and interference signals. By sharing the same waveform, E is able to perform both functions simultaneously while efficiently utilizing its limited RF chains. The analog beamforming matrix U n = [ u n , 1 , u n , 2 , , u n , M ] C N × M determines the spatial direction of signal transmission, while the digital transmit beamforming vector p n , l = [ p n , l , 1 , p n , l , 2 , , p n , l , M ] T C M × 1 adjusts the power and phase of each stream at a specific time index l. The signal index l = 1 , 2 , , L denotes the time slot within a single beamforming direction during a full radar scan cycle. In other words, for every direction θ n , the monitor transmits L symbols before switching to the next. Together, the matrix U n and the potentially time-varying vector p n , l form the hybrid beamformer, where U n provides coarse, wideband analog phase shifting and p n , l allows for fine-grained digital control.
For simplicity in the subsequent optimization problem, we assume that this digital beamformer remains constant within the transmission block for any given direction n. Thus, we set p n , l = p n for all l = 1 , , L , and our goal is to optimize a single, time-invariant digital beamformer p n for each direction.
For the receive module, the received signal includes the signal received by the radar and the signal received by the suspect receiver. The received signal at the legitimate monitor E consists of suspicious signals, radar detection echoes, radar clutter, and noise. The received signal at the legitimate monitor E for the θ n direction can be expressed as
y e ( l ) = U ˜ n H h s e p s s ( l ) suspicious signal + U ˜ n H A n U n p n , l c n ( l ) radar echo + U ˜ n H j A j U n p n , l c n ( l ) radar clutter + n ( l ) noise ,
where U ˜ n = [ u ˜ n , 1 , , u ˜ n , M ] C N × M represents the analog receive beamforming matrix, while U n and p n , l are the previously defined analog and digital transmit beamformers at E, respectively. Furthermore, p s is the corresponding transmit power from S, and  A j represents the channel matrix for the j-th clutter source. The term n ( l ) CN ( 0 , σ 2 I ) denotes additive Gaussian white noise (AWGN) with σ 2 representing the noise power. When the number of antennas N is substantial, the radar detection system can achieve high angular resolution, which in turn significantly diminishes the clutter noise to a comparatively minimal level. Additionally, the clutter noise is inherently constrained by the maximum power limit due to the finite transmit power. By applying the central limit theorem, the aggregate effect of the clutter from multiple directions and the noise, denoted by U ˜ n H j A j U n p n , l + n , can be simply treated as a Gaussian random variable with a variance of σ ˜ 2  [13,14].
The received signal at the suspicious receiver D includes suspicious signals, interfering signals from E, and noise. Thus the received signal at D for the θ n direction can be written as
y d ( l ) = h s d p s s ( l ) suspicious signal + h e d H U n p n , l c n ( l ) jamming signal + n ( l ) noise ,
where n CN ( 0 , σ 2 ) denotes the AWGN, which follows a complex normal distribution with the noise variance being σ 2 .
In order to distinguish between suspicious signals and radar echo signals, we have designed vectors w ˜ s , n and w ˜ r , n to reside in the null-spaces of U ˜ n H A s r , n U n and U ˜ n H h s e , respectively. Thus, we can redefine w ˜ s , n Z s , n w s , n and w ˜ r , n Z r , n w r , n , where w s , n and w r , n C ( M 1 ) × 1 are the equivalent digital receive beamforming vectors. Additionally, Z s , n and Z r , n C M × ( M 1 ) are defined as the null spaces of U ˜ n H A n U n and U ˜ n H h s e , respectively. Since the ranks of U ˜ n H A s r , n U n and U ˜ n H h s e are both 1, Z s , n and Z r , n are always present. This null-space design approach effectively mitigates the primary interference between the radar echo signals and suspicious signals.
With the interference between the radar and communication signals properly mitigated through the null-space projection design, we are now able to quantitatively evaluate the performance of both functionalities. To this end, we introduce multiple SINR expressions that correspond to different receiving roles and tasks within the system. These SINRs reflect the system’s ability to perform eavesdropping, communication disruption, and accurate radar localization simultaneously. Then we can obtain the SINRs of the system, each corresponding to different functionalities.
  • SINR E : the SINR at the legitimate monitor E for decoding the suspicious communication signal from S to D. This measures E’s ability to eavesdrop on the signal from S.
  • SINR D : the SINR at the suspicious receiver D, which receives the communication from S and interference from E. This reflects the quality of D’s reception, where interference from E degrades D’s signal, improving E’s eavesdropping ability.
  • SINR S , radar : the SINR at E when using radar to detect the echo reflected from S. This measures E’s radar performance in detecting S’s position.
  • SINR D , radar : the SINR at E when receiving radar echoes from D. This reflects E’s ability to detect and track D’s location, aiding in joint sensing and decision-making.
These four SINRs are written as
SINR E = n = 1 N w s , n H Z s , n H U ˜ n H h s e 2 p s n = 1 N σ ˜ 2 w s , n H w s , n ,
SINR D = n = 1 N h s d , n 2 p s n = 1 N ( h e d , n H U n p n 2 ) + N σ 2 ,
SINR S , radar = n = 1 N w s , r , n H Z s , r , n H U ˜ n H A s r , n U n p n 2 n = 1 N σ ˜ 2 w s , r , n H w s , r , n ,
SINR D , radar = n = 1 N w D , r , n H Z D , r , n H U ˜ n H A r d , n U n p n 2 n = 1 N σ ˜ 2 w D , r , n H w D , r , n ,
where A s r denotes the matrix of detection channels between radar and suspicious transmitters, and  A r d denotes the matrix of detection channel between radar and suspicious receiver. Additionally, SIN R E and SIN R D are calculated over one scan period.
In our primary model, we assume ideal self-interference (SI) cancellation for the full-duplex monitor E. However, in practical implementations, imperfect analog and digital cancellation would result in residual self-interference (RSI). This RSI manifests as an additional noise-like term at the receiver of E. Consequently, the SINR for the eavesdropping link, SIN R E , would be modified. Specifically, the power of the RSI, denoted as σ RSI 2 , is added to the noise and clutter term in the denominator.
The structure of our bilevel optimization problem remains intact with this modification, meaning our proposed solution methodology is still applicable. To quantitatively address the level of tolerable RSI, we can directly analyze the condition for successful eavesdropping, SINR E > SINR D . By incorporating the RSI power, σ RSI 2 , into the denominator of SIN R E as defined in (4), this condition becomes     
n = 1 N w s , n H Z s , n H U ˜ n H h s e 2 p s n = 1 N σ ˜ 2 w s , n H w s , n + σ RSI 2 > SINR D
Rearranging this inequality allows us to establish a clear upper bound on the tolerable RSI power:
σ RSI 2 < n = 1 N w s , n H Z s , n H U ˜ n H h s e 2 p s SINR D n = 1 N σ ˜ 2 w s , n H w s , n
This inequality provides a precise, quantitative answer: the tolerable RSI power is not a fixed value but is contingent upon the strength of the eavesdropped signal at E, the target’s link quality ( SINR D ), and the receiver’s original noise floor. Our framework is effective as long as the system’s SI cancellation capability can meet this condition.

2.2. Problem Formulation

The core challenge in this ISAC system is to jointly optimize two coupled objectives: maximizing the probability of successful eavesdropping and ensuring radar localization accuracy. Owing to the inherent hierarchy of these tasks—surveillance being the primary mission, with sensing as a concurrent requirement—we model this problem using a bilevel optimization framework.
In this framework, the upper-level objective aims to maximize the probability of successful eavesdropping, while the lower-level objective is to optimize the localization performance of the radar on suspicious transmitters. This leader–follower structure reflects the practical separation of mission priority and allows each subtask to adapt to the outcome of the other. To provide a clear visual representation of this bilevel interaction, we illustrate the proposed framework in Figure 2.
To evaluate the success of the upper-level objective—legitimate eavesdropping—we adopt the SINR-based decoding criterion established in [15]. Specifically, if  SINR E < SINR D , the legitimate monitor is incapable of error-free information eavesdropping. On the other hand, if  SINR E > SINR D , the legitimate monitor can ensure the reliability of its information decoding. Based on this principle, we define the following indicator function to characterize the occurrence of successful eavesdropping:
Y = 1 , SINR E SINR D , 0 , SINR E < SINR D .
Therefore, the upper-level objective is to maximize the successful eavesdropping probability, denoted as P eav = P ( SINR E SINR D ) . While deriving a closed-form expression for P eav is intractable for our complex system, it is well known that the probability of correct detection (or decoding) is a monotonically increasing function of the received SINR, as detailed in classical detection theory [16,17]. Thus, maximizing the SINR gap, Δ SINR = SINR E SINR D , provides a direct and tractable proxy for maximizing the true probability of success. So, the upper-level objective can be written as
max U n , p n , U ˜ n n = 1 N w s , n H Z s , n H U ˜ n H h s e 2 p s n = 1 N σ ˜ 2 w s , n H w s , n n = 1 N h s d , n 2 p s n = 1 N h e d , n H U n p n 2 + N σ 2 .
Then, because the lower-level objective is the localization performance of radar at the suspicious transmitter, we can formulate it as the SINR S , radar . Combining the upper-level and the lower-level objectives, and adding some constraints, we can rewrite the bilevel problem as
max U n , p n , U ˜ n n = 1 N w s , n H Z s , n H U ˜ n H h s e 2 p s n = 1 N σ ˜ 2 w s , n H w s , n n = 1 N h s d , n 2 p s n = 1 N h e d , n H U n p n 2 + N σ 2 ,
s . t . U n , p n , U ˜ n a r g m a x U z , n , p z , n , U ˜ z , n n = 1 N w s , r , n H Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n 2 n = 1 N σ ˜ 2 w s , r , n H w s , r , n ,
U z , n p z , n 2 p max , U z , n ( i , j ) = 1 ,
w D , r , n H Z D , r , n H U ˜ z , n H A r d , n U z , n p z , n 2 n = 1 N σ ˜ 2 w D , r , n H w D , r , n γ r , n ,
where the variables U z , n , p z , n , U ˜ z , n represent the same physical quantities as U n , p n , U ˜ n , respectively. These variables are introduced merely for convenience in the subsequent algorithm exposition, and their inclusion helps facilitate the optimization process. The constraints U z , n p z , n 2 p max reflect the power limits, while the condition SINR D , radar γ r guarantees the effectiveness of radar detection.
The above problem is a bilevel problem. Here, the lower-level problem aims to maximize the SIN R S , radar (12b) under the power limitation and other constraints. Within the set of the optimal solution to the lower-level problem, the upper-level problem aims to maximize the SINR E SINR D  (12a). Unlike the traditional single-level problem, we need to obtain the set of optimal solutions at the lower level and then bring in the upper level to find the optimal solution at the upper level. However, since bilevel optimization requires a convex lower-level problem, which is not satisfied in our case, we cannot apply it directly. In the following, we transform the original problem into an equivalent form that can be tackled more effectively.

3. Proposed Algorithm

In this section, we first use the Rayleigh quotient to put the problem in its simplest form. Then, we decouple our problems and introduce penalty terms so that we can develop a solution for the lower-level problem with convex underlying goals. Finally, we introduce the bilevel algorithm to solve the problem.

3.1. Simplification and Reformulation of Problem (12)

We now consider the optimization problem in lower-level problem (12b). Let us define
w s w s , r , 1 H , w s , r , 2 H , , w s , r , N H H C ( M 1 ) N × 1 ,
h s ( Z s , r , 1 H A s r , 1 H U z , 1 p z , 1 ) H ( Z s , r , 2 H A s r , 2 H U z , 2 p z , 2 ) H ( Z s , r , N H A s r , N H U z , N p z , N ) H C ( M 1 ) N × 1 .
Then, we can transform the problem (12b) into the following problem:
max w s w s H h s 2 σ ˜ 2 w s H w s .
To solve this, we first analyze the numerator. Since w s H h s is a scalar, its squared norm can be expanded as:
w s H h s 2 = ( w s H h s ) ( w s H h s ) H = ( w s H h s ) ( h s H w s ) = w s H ( h s h s H ) w s .
By substituting this back into (15), the optimization problem becomes
max w s w s H ( h s h s H ) w s w s H w s .
This expression is a generalized Rayleigh quotient of the form x H A x x H x . Here, the matrix A = h s h s H is rank-1 and, importantly, Hermitian, since A H = ( h s h s H ) H = h s h s H = A . The maximum value of this quotient is the largest eigenvalue of A, and the optimal vector w s is the corresponding principal eigenvector. For a rank-1 matrix like h s h s H , the principal eigenvector is simply h s itself. This observation justifies the formulation and leads directly to Lemma 1.
Lemma 1. 
Based on the Rayleigh quotient [18], a closed-form expression for the optimal w s can be achieved as
w s = h s σ ˜ 2 .
Since problem (15) is a typical Rayleigh quotient maximization problem, we insert Equation (18) into problem (15) and then substitute the original forms of vector h s and vector w s into the newly obtained equation. Then we can formulate the new problem as follows:
max U z , n , p z , n , U ˜ z , n n = 1 N Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n 2 σ ˜ 2 .
The objective function in (19) is non-convex and involves highly coupled variables, making it difficult to solve directly. To make the problem tractable, we employ a penalty-based decoupling strategy, a standard technique for handling complex constraints in optimization theory [19]. The core idea is to transform a problem with hard equality constraints into an approximately equivalent problem by adding quadratic penalty terms to the objective function, which penalize any deviation from the original constraints.
Following this approach, we introduce several auxiliary variables to decouple the complex expressions. Let us define
X Z s , r , n H U ˜ n H A s r , n U n p n , Y U n p n ,
X z Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n , Y z U z , n p z , n .
Here, the variables without the subscript ‘z’ are for the upper level, while those with ‘z’ are their counterparts in the lower-level problem, introduced for convenience in the algorithm. By incorporating these definitions and their corresponding penalty terms, we can reformulate the lower-level problem as:
U n , p n , U ˜ n a r g m a x U z , n , p z , n , U ˜ z , n , X z , Y z n = 1 N X z 2 σ ˜ 2 μ Y z U z , n p z , n 2 μ X z Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n 2 , s . t . U z , n p z , n 2 p max , U z , n ( i , j ) = 1 , n = 1 N Z D , r , n H U ˜ z , n H A r d , n Y z 2 σ ˜ 2 γ r , X z = Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n , Y z = U z , n p z , n .
Similarly, we can employ (18) in the upper-level problem (12a) and combine the obtained result with Equation (22) where maximizing the objective in the lower-level problem is converted into minimizing the corresponding negative objective. Then we can obtain the formulated bilevel problem as follows:   
min U n , p n , U ˜ n n = 1 N h s d , n 2 p s n = 1 N ( h e d , n H Y 2 ) + N σ 2 n = 1 N Z s , n H U ˜ n H h s e , n 2 p s σ ˜ 2 ,
s . t . U n , p n , U ˜ n a r g m a x U z , n , p z , n , U ˜ z , n , X z , Y z ( n = 1 N X z 2 σ ˜ 2 μ Y z U z , n p z , n 2 μ X z Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n 2 ) ,
U z , n p z , n 2 p max , U z , n ( i , j ) = 1 ,
n = 1 N Z D , r , n H U ˜ z , n H A r d , n Y z 2 σ ˜ 2 γ r , n ,
X = Z s , r , n H U ˜ n H A s r , n U n p n , Y = U n p n ,
X z = Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n , Y z = U z , n p z , n .

3.2. Proposed Algorithm to the Bilevel Problem

To solve the constrained bilevel optimization problem in our ISAC system, we adopt a first-order penalty-based approach inspired by recent advances in bilevel optimization [20]. Although the lower-level subproblem in our formulation is convex, the upper-level objective involves non-convex constraints, making the bilevel structure difficult to handle directly using standard techniques such as KKT-based reformulations or implicit differentiation.
To address this, we reformulate the bilevel problem by explicitly defining the upper-level objective f ( x , y ) , the lower-level objective f ˜ ( z , y ) , and the lower-level constraints g ˜ ( x , z ) . These functions encode the physical objectives of our system. f ( x , y ) reflects the performance metric related to the legitimate monitor, such as signal reception or eavesdropping capability; f ˜ ( z , y ) quantifies the radar sensing quality; g ˜ ( x , z ) captures the power and SINR constraints associated with the radar operations. With these definitions, the original bilevel problem can be expressed in the standard form:
f = min f ( x , y ) s . t .   y arg   min z f ˜ ( x , z ) g ˜ ( x , z ) 0 .
The above structure matches the setting studied in [20], where the lower-level problem is a convex problem but the upper-level problem may be a non-convex one. Under such conditions, a penalty reformulation is proposed to approximate the bilevel problem using a minmax formulation, which can be solved with traditional methods.
In our specific case, since all decision variables appear in either y or z, and no variable is independently assigned to x, we set x , y { U n , p n , U ˜ n , X , Y } and z { U z , n , p z , n , U ˜ z , n , X z , Y z } . The bilevel problem is thus written as
f = min f ( y ) s . t . y arg min z f ˜ ( z ) g ˜ ( z ) 0 .
To proceed with solving the bilevel problem formulated in Equation (25), we follow the first-order penalty approach introduced in [20]. Specifically, we introduce a penalty function to handle the lower-level constraint by incorporating it into the objective.
P ˜ μ ( x , z ) = f ˜ ( x , z ) + μ [ g ˜ ( x , z ) ] + 2 ,
where μ > 0 is a penalty parameter and [ · ] + denotes the component-wise maximum with zero. This penalized formulation approximates the lower-level constrained problem by smoothing the feasible region.
Based on this, the bilevel problem can be approximately reformulated as
f μ = min x , y f ( x , y ) y arg min z P ˜ μ ( x , z ) .
To further eliminate the constraint y argmin z P ˜ μ ( z ) , we consider the value function of the penalized lower-level problem. Let V μ : = min z P ˜ μ ( x , z ) denote the minimum value of the penalized lower-level objective. Then, the constraint y arg min z P ˜ μ ( x , z ) is equivalent to enforcing min z P ˜ μ ( x , z ) = V μ . This motivates a value-function-based penalization of the form
f ( y ) + ρ P ˜ μ ( x , y ) V μ ,
where ρ > 0 is an outer-level penalty parameter. As shown in [20], minimizing this relaxed objective yields a solution that asymptotically satisfies the original bilevel constraints as ρ . From m i n z P ˜ μ ( x , z ) = V μ , we have
min x , y f ( x , y ) + ρ P ˜ μ ( x , y ) min z P ˜ μ ( x , z ) ,
which can be further written as the following minmax problem:
min x , y max z P ρ , μ ( x , y , z ) ,
where the penalized objective is defined by
P ρ , μ ( x , y , z ) : = f ( x , y ) + ρ P ˜ μ ( x , y ) P ˜ μ ( x , z ) .
We now turn to the structure of the functions involved in the objective and constraints. It is worth noting that the constant modulus constraint, U z , n ( i , j ) = 1 , is handled differently from other constraints. Instead of introducing a corresponding penalty term, we enforce this constraint directly in our algorithm by parameterizing the elements of the analog beamformer as complex exponentials. This ensures the constraint is always satisfied by construction. The remaining functions and constraints are handled by the penalty framework. Specifically, the upper-level objective f ( y ) and the lower-level function f ˜ ( z ) are split into components as follows:
f ( y ) = f 1 ( y ) = n = 1 N h s d , n 2 p s n = 1 N h e d , n H Y 2 + N σ 2 n = 1 N Z s , n H U ˜ n H h s e , n 2 p s σ ˜ 2 , f ˜ ( z ) = f ˜ 2 ( z ) = n = 1 N X z 2 σ ˜ 2 + μ Y z U z , n p z , n 2 + μ X z Z s , r , n H U ˜ z , n H A s r , n U z , n p z , n 2 .
The function f 1 ( y ) represents the upper-level performance metric associated with the legitimate monitor reception quality or eavesdropping capability, while f 2 ( y ) quantifies the penalty term that comes from the radar sensing quality, which we want to minimize to reduce interference.
Similarly, the constraints are divided as
g 1 ( z ) = U z , n p z , n 2 p max , g 2 ( z ) = γ r n = 1 N Z D , r , n H U ˜ z , n H A r d , n Y z 2 σ ˜ 2 .
The constraints g 1 ( y ) and g 2 ( y ) capture the power and SINR constraints for the radar operations. Specifically, g 1 ( y ) ensures that the power consumption does not exceed the maximum power p max , and  g 2 ( y ) captures the SINR constraints to guarantee radar sensing quality.
The decomposition of the objective and constraints into separate components for the upper and lower levels is a direct consequence of the penalty-based reformulation. This allows us to handle the minimization and maximization of the functions separately, which simplifies the optimization process and ensures that the penalization of constraint violations is smoothly incorporated. This provides a natural way to handle the original bilevel problem as a minmax problem. Therefore, the function in (31) can be decomposed using the additive structure of f and f ˜ , yielding
P ρ , μ ( x , y , z ) = f 1 ( x , y ) + f 2 ( x ) + ρ f ˜ 1 ( x , y ) f ˜ 1 ( x , z ) + ρ μ [ g ˜ ( x , y ) ] + 2 [ g ˜ ( x , z ) ] + 2 + ρ f ˜ 2 ( y ) f ˜ 2 ( z ) .
Given that P ρ , μ ( x , y , z ) is non-convex in ( x , y ) , concave in z, and built from smooth and proximally well-behaved functions, the corresponding minmax problem can be equivalently reformulated as
min x max y h ( x , y ) + p ( x ) q ( y ) ,
where the individual terms are defined as
p ( x ) = ρ f ˜ 2 ( x ) , q ( y ) = ρ f ˜ 2 ( y ) , h ( x , y ) = f 1 ( x ) + ρ μ [ g ˜ 1 ( x ) ] + 2 + [ g ˜ 2 ( x ) ] + 2 ρ μ [ g ˜ 1 ( y ) ] + 2 + [ g ˜ 2 ( y ) ] + 2 .
Thus, the original bilevel optimization problem has been successfully reformulated as a structured minmax problem. This reformulation enables the application of the traditional methods for solving bilevel problems. To efficiently solve the resulting minmax problem, we design an iterative algorithm that alternately updates the variables x and y while dynamically adjusting the penalty parameters ρ and μ . It is important to note that this algorithmic framework is robust; as established in our system model, practical imperfections such as RSI do not alter the fundamental problem structure, thus ensuring the applicability of the proposed method. The detailed procedure is outlined as Algorithm 1.
To elaborate, Algorithm 1 is designed to solve the structured minmax problem by alternately updating the variables y and x. At each iteration, the algorithm first updates y by solving the inner maximization problem. Specifically, it minimizes the negative of the objective function, that is ( h ( x , y ) + p ( x ) q ( y ) ) , to approximate the maximum with respect to y given the current estimate of x. Once the optimal y corresponding to the current x is obtained, the algorithm substitutes it into the objective and proceeds to update x by solving the outer minimization problem. In this way, the algorithm progressively minimizes the outer objective while accounting for the adversarial behavior of y. Meanwhile, the penalty parameters ρ and μ are dynamically adjusted during the iterations to gradually enforce constraint satisfaction and improve solution stability. This alternating optimization strategy enables the algorithm to approach a saddle point of the original minmax formulation and effectively solve the reformulated bilevel problem.
Convergence and Feasibility Analysis. Regarding the convergence and feasibility of Algorithm 1, it is important to note that for a non-convex problem such as this, guaranteeing convergence to a global optimum is generally intractable. Our objective is instead to find a high-quality stationary point. The feasibility of the solution is ensured by the penalty method itself; as the penalty parameters ρ and μ are progressively increased during the iterations, the solution is driven towards the feasible set of the original constrained problem [20]. While a formal convergence proof for our specific alternating algorithm is beyond the scope of this paper, this structure is a standard and effective heuristic designed to find a stationary point of the reformulated minmax problem. The practical effectiveness of this convergence is validated in our simulation results.
Computational Complexity Analysis. The overall computational complexity of the proposed Algorithm 1 is dominated by the iterative updates of variables x and y. In each outer iteration, the algorithm solves two main subproblems: a maximization with respect to y and a minimization with respect to x. Assuming a gradient-based method is used to solve each subproblem for a fixed number of inner steps, the cost per iteration is primarily determined by the gradient computation of the functions h ( x , y ) , p ( x ) , and  q ( y ) . The dimensions of the variables x and y are mainly determined by the number of antennas N and RF chains M. Consequently, the complexity of computing the gradient for each step involves matrix–vector multiplications and scales polynomially with these parameters. Let T outer be the number of outer iterations and T inner be the number of inner gradient steps for each subproblem. The total computational complexity can be characterized as O ( T outer · T inner · poly ( N , M ) ) , where poly ( N , M ) represents the cost of a single gradient evaluation. As our simulation results demonstrate, the algorithm is practically efficient, converging within a few hundred outer iterations, which validates the effectiveness of this approach.

4. Simulation Results

In this section, we present the simulation results that demonstrate the superiority of our bilevel algorithm.
Algorithm 1 The proposed method for the minmax problem (35)
  • Input: N , M ( N M ), x 0 , y 0 , ρ > 0 , μ = 0.5 , tolerance = 10 20 , maxIters = 3000 , t = 0 , etc.
  • for i = 0 , 1 , 2 , do
  •      for  j = 0 , 1 , 2 ,  do
  •           t 0
  •          while  x t + 1 x t + y t + 1 y t tolerance and t maxIters do
  •             Update y t + 1 by solving:
  •                  min y ( h ( x t , y ) + p ( x t ) q ( y ) )
  •             Update x t + 1 by solving:
  •                  min x h ( x , y t + 1 ) + p ( x ) q ( y t + 1 )
  •             Update ρ , μ
  •              t t + 1
  •          end while
  •      end for
  • end for

4.1. Simulation Setup

In our simulations, we adopt a hybrid analog–digital architecture where the numbers of antennas and RF chains are set to N = 16 and M = 4 , respectively. The inter-antenna spacing is set to half the wavelength ( d = 0.5 λ ). The main beam is directed toward an angle of θ n = π / 4 , and other angles θ 1 and θ 2 are randomly generated around π / 6 and π / 4 , respectively, to simulate the beam directions.
The noise power is set as σ = σ ˜ = 3 W . The impact of noise on performance is not considered separately. Additionally, the maximum transmit power is fixed at P s = 10 dBm. The gain factor β n is set to 1.2. The constraint of the radar’s reception of signals from the suspicious receiver D, denoted as γ r , is specified in relevant sections.
The locations of the suspicious transmitter S, suspicious receiver D, and the legitimate monitor S are set as follows: S is placed at the origin ( 0 , 0 ) m , D is located at ( 0 , 60 ) m , and S is positioned at ( 80 , 0 ) m .
The wireless channels between S - E , S - D , and E - D are generated based on a composite fading model that includes both large-scale and small-scale effects. The large-scale fading is modeled as a distance-dependent path loss using the logarithmic model.
L ( d ) = 30 + 36 log 10 ( d ) dB ,
where d is the Euclidean distance in meters between the transmitter and receiver. The corresponding path loss gain is given by G ( d ) = 10 L ( d ) / 10 . The small-scale fading follows a Rician distribution, where the Rician K-factors K SE , K SD , and K ED are set to 10 0.3 , 10 0.8 , and 10 0.6 , corresponding to 3 dB , 8 dB , and 6 dB , respectively. The Rician K-factors represent the power ratio between the line-of-sight (LoS) and non-line-of-sight (NLoS) components. A higher η indicates a stronger LoS dominance. The final channel matrices are computed as the product of the large-scale fading gain and the Rician fading component.
To supplement the SINR metric and provide a more direct assessment of radar performance, we also evaluate the probability of detection ( P D ). Following established methodologies in detection theory [21,22], we calculate the P D by mapping our simulated SIN R S , radar results for a given constant Probability of False Alarm ( P F A ). This allows for a direct translation from the SINR, which our algorithm optimizes, to a more practical operational metric. For this calculation, we set the false alarm rate to P F A = 10 3 and the number of pulses to L = 4 .

4.2. Performance Verification

To evaluate the performance of the proposed bilevel algorithm, we compare it with a benchmark scheme as described below.
Conventional Constrained Single-Level Scheme. To highlight the advantages of our bilevel approach, we compare it against a more conventional single-level constrained optimization scheme that aims to maximize the upper-level objective, namely, the active eavesdropping capability, while incorporating the lower-level goal, the radar localization performance, as a constraint. Specifically, this scheme solves the following single-level problem:
max U n , p n , U ˜ n n = 1 N Z s , n H U ˜ n H h s e , n 2 p s σ ˜ 2 n = 1 N h s d , n 2 p s n = 1 N h e d , n H Y 2 + N σ 2
s . t . SINR S , radar γ r 1 ,
SINR D , radar γ r 2 ,
U z , n p z , n 2 p max , | U z , n ( i , j ) | = 1 , n , i , j .
Because the radar performance is enforced via the constraint in (38b), the resulting beamforming solution is functionally radar-aware. This provides a fair and meaningful comparison against our bilevel formulation, allowing us to evaluate which optimization philosophy—hierarchical co-optimization versus constrained single-level optimization—achieves a better trade-off between the two objectives.
Figure 3 illustrates the convergence behavior of the bilevel algorithm, showing how the radar’s sum rate changes with the number of iterations. From the figure, it is evident that the algorithm converges quickly, reaching near convergence after approximately 80 to 100 iterations. After this point, the sum rate stabilizes, indicating that the algorithm achieves efficient convergence with relatively few iterations.
We also compare the performance of the bilevel algorithm against single-level algorithm in terms of the noise power parameter as shown in Figure 4. Although the single-level algorithm (represented by the red curve) slightly outperforms the bilevel algorithm in eavesdropping performance (represented by the blue curve), the bilevel algorithm demonstrates superior overall performance by optimizing both the upper-level and lower-level objectives. As we can see, the radar performance of the bilevel algorithm (represented by the yellow curve) surpasses the radar performance of the single-level algorithm (represented by the purple curve). As the noise power increases, the bilevel algorithm maintains a higher radar performance, showing its robustness in handling noise.
Next, the performance with respect to the number of RF chains is illustrated in Figure 5. As the number of RF chains increases, both eavesdropping and radar performance improve for both the bilevel and single-level algorithms. However, the key insight here is the radar performance (represented by the red curve for the bilevel algorithm and the purple curve for the single-level algorithm) clearly demonstrates that the bilevel algorithm maintains a significantly higher advantage. Meanwhile, the dashed curves in Figure 5 depict the corresponding detection probabilities. Consistent with the SINR trends, the bilevel scheme sustains an almost unit-level P D across the entire RF-chain range, whereas the single-level scheme starts below 0.5 and only approaches near-perfect detection once M 8 , further underscoring the bilevel algorithm’s robustness in preserving radar reliability.
Additionally, as the number of RF chains increases, the eavesdropping performance of the bilevel algorithm (represented by the blue curve) gradually surpasses that of the single-level algorithm (represented by the yellow curve). This shows that the bilevel optimization approach better balances radar and eavesdropping objectives, resulting in superior radar performance especially as the number of RF chains increases. This growing advantage can be attributed to the increased spatial degrees of freedom for precoding; with more RF chains, the bilevel algorithm can better leverage spatial multiplexing to craft more sophisticated beamformers that effectively nullify interference while simultaneously satisfying the radar performance constraints.
Additionally, in Figure 6, we analyze the performance with respect to the number of antennas. As the number of antennas increases, it is evident that the eavesdropping performance (represented by the blue curve for the bilevel algorithm and the yellow curve for the single-level algorithm) shows minimal difference between the bilevel and single-level algorithms. Both algorithms exhibit a general improvement as the number of antennas grows, with the bilevel algorithm maintaining slightly better performance in some cases. However, the key distinction between the two approaches lies in radar performance. The bilevel algorithm significantly outperforms the single-level algorithm in radar detection, demonstrating a superior ability to leverage additional antennas for better radar functionality.
Although we observe that, with a higher number of antennas, the bilevel radar performance starts to slightly decrease, this counter-intuitive trend is not an algorithmic flaw but a feature of sophisticated trade-off management. This phenomenon can be attributed to two factors: first, a power dilution effect where the fixed total power is spread across more antennas, and second, a strategic decision by the bilevel optimizer. With more spatial degrees of freedom available, the algorithm intelligently determines that a marginal sacrifice in the secondary radar objective can be traded for a more significant gain in the primary eavesdropping objective. This reduction is still less pronounced compared to the substantial improvements seen in the single-level radar performance. The bilevel optimization method still maintains its edge by achieving a more balanced and optimal use of antennas across both radar and eavesdropping tasks, ensuring that the trade-off does not heavily compromise the overall performance.
Finally, we evaluate the robustness of our proposed algorithm under varying channel conditions by sweeping the Rician K-factor from −5 dB to 15 dB, with the results shown in Figure 7. The K-factor indicates the ratio of the LoS power to the NLoS power; a lower K-factor indicates a more challenging, scattering-rich environment, while a higher K-factor represents a more stable, LoS-dominant channel. As observed, the key advantage of the proposed bilevel algorithm lies in its robust radar performance. The radar SINR (represented by the red curve) remains consistently high across the entire range of the K-factor, demonstrating that our algorithm successfully protects the lower-level objective regardless of the channel quality, which varies from NLoS-dominant (low K) to LoS-dominant (high K). Regarding the eavesdropping performance, both schemes exhibit similar behavior, with performance generally improving as the channel becomes more predictable with a higher K-factor.
Across various system parameters (noise power, RF chains, antenna count) and channel conditions (Rician K-factor), our scheme consistently demonstrates a superior ability to manage the trade-off between radar localization and proactive eavesdropping.

4.3. Discussion on Model Assumptions and Limitations

In this section, we elaborate on the key assumptions of our system model to clarify their suitability and limitations, thereby contextualizing our results.
Gaussian Clutter and Noise Model: The assumption that aggregate clutter and noise follow a Gaussian distribution is a foundational and practical simplification in the radar signal processing literature. This is justified by the central limit theorem, particularly when clutter arises from a large number of independent, randomly distributed scatterers. We acknowledge, however, that this model has limitations. In environments characterized by a few dominant, "spiky" clutter sources (e.g., large buildings), the interference may exhibit heavier tails and could be more accurately described by other statistical models, such as the K-distribution or Weibull distribution.
Rician Fading Channel Model: Our use of the Rician fading model is standard for wireless channels that include a dominant LoS path alongside scattered multipath components. This is highly relevant for ISAC scenarios, where a stable LoS path is often crucial for reliable sensing. The Rician K-factor allows us to parameterize the strength of this LoS component. To explicitly validate our algorithm’s performance across different channel realities, our robustness analysis with respect to the K-factor as shown in Figure 7 demonstrates that our algorithm maintains strong radar performance even in challenging low-K (NLoS-dominant) conditions.
Perfect Channel State Information (CSI): Following the prevailing practice in ISAC research [23], we assume perfect CSI at the transmitter. This idealized setting establishes an unequivocal performance upper bound and allows the intrinsic advantage of our bilevel optimization structure to emerge without the confounding influence of channel-estimation errors. Nevertheless, CSI in real deployments is inevitably imperfect. According to [23], uncertainty in CSI induces a fundamental trade-off between communication throughput and the accuracy of channel-state estimation, thereby motivating robust physical-layer designs. Several mature techniques can be embedded into our framework to mitigate such uncertainty, including worst-case robust optimization—which bounds the estimation error within an ellipsoidal set and, via the S-procedure, yields a tractable semidefinite program [24], chance-constrained formulations that ensure probabilistic performance guarantees when only error statistics are available, and distributionally robust methods that hedge against model mismatch. Integrating these robust counterparts into the following problem while preserving the upper-level resource-allocation strategy constitutes a primary direction of our future work.

5. Conclusions

In this paper, a bilevel optimization algorithm has been developed for ISAC systems, aiming to maximize the active eavesdropping probability while ensuring high radar localization performance. We reformulated the problem by using the Rayleigh quotient, decoupling the objectives and introducing penalty terms. This allowed us to apply a bilevel algorithm to optimize both beamforming matrices. Extensive simulation results demonstrate that our algorithm effectively maintains high radar localization accuracy while achieving nearly the same active eavesdropping probability as existing methods, showcasing its superior performance in ISAC scenarios. Future work will consider extending the proposed framework to multi-user scenarios and enhancing robustness under imperfect channel conditions.

Author Contributions

Conceptualization, methodology, software, and validation, T.X. and W.L.; formal analysis and investigation, T.X., W.L. and M.Z.; resources and data curation, T.X. and W.L.; writing—original draft preparation, T.X.; writing—review and editing, T.X., W.L., Y.H. and G.Y.; visualization, T.X. and W.L.; supervision, G.Y. and Y.C.; project administration, G.Y. and Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the “Pioneer” and “Leading Goose” R&D Program of Zhejiang under grant No. 2024C01183.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wei, Z.; Qu, H.; Wang, Y.; Yuan, X.; Wu, H.; Du, Y.; Han, K.; Zhang, N.; Feng, Z. Integrated Sensing and Communication Signals Toward 5G-A and 6G: A Survey. IEEE Internet Things J. 2023, 10, 11068–11092. [Google Scholar] [CrossRef]
  2. Moon, J.; Lee, S.H.; Lee, H.; Lee, I. Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection. IEEE Trans. Wirel. Commun. 2019, 18, 3726–3738. [Google Scholar] [CrossRef]
  3. Khoshafa, M.H.; Maraqa, O.; Moualeu, J.M.; Aboagye, S.; Ngatched, T.M.N.; Ahmed, M.H.; Gadallah, Y.; Renzo, M.D. RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2024. early access. [Google Scholar] [CrossRef]
  4. Ren, Z.; Xu, J.; Qiu, L.; Wing Kwan Ng, D. Secure Cell-Free Integrated Sensing and Communication in the Presence of Information and Sensing Eavesdroppers. IEEE J. Sel. Areas Commun. 2024, 42, 3217–3231. [Google Scholar] [CrossRef]
  5. Bazzi, A.; Chafii, M. Secure Full Duplex Integrated Sensing and Communications. IEEE Trans. Inf. Forensics Secur. 2024, 19, 2082–2097. [Google Scholar] [CrossRef]
  6. Wei, Z.; Liu, F.; Masouros, C.; Su, N.; Petropulu, A.P. Toward Multi-Functional 6G Wireless Networks: Integrating Sensing, Communication, and Security. IEEE Commun. Mag. 2022, 60, 65–71. [Google Scholar] [CrossRef]
  7. Sinha, A.; Malo, P.; Deb, K. A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications. IEEE Trans. Evol. Comput. 2018, 22, 276–295. [Google Scholar] [CrossRef]
  8. He, Y.; Cai, Y.; Yu, G.; Wong, K.-K. Joint transceiver design for dual-functional full-duplex relay aided radar-communication systems. IEEE Trans. Commun. 2022, 70, 8355–8369. [Google Scholar] [CrossRef]
  9. He, Y.; Cai, Y.; Yu, G. Beamforming Design with Bilevel Optimization for RIS-Assisted SWIPT Systems. In Proceedings of the 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 9–13 June 2024; pp. 578–583. [Google Scholar] [CrossRef]
  10. Zhang, M.; He, Y.; Cai, Y.; Yu, G.; Al-Dhahir, N. Design and Performance Analysis of Wireless Legitimate Surveillance Systems With Radar Function. IEEE Trans. Commun. 2023, 71, 2517–2531. [Google Scholar] [CrossRef]
  11. United States Code. 47 U.S.C. § 333—Fraudulent or Malicious Interference; Jamming. United States Code, Title 47, Section 333. 2025. Available online: https://www.law.cornell.edu/uscode/text/47/333 (accessed on 20 June 2025).
  12. United Kingdom Parliament. Regulation of Investigatory Powers Act 2000, c. 23. Available online: https://www.legislation.gov.uk/ukpga/2000/23/contents (accessed on 20 June 2025).
  13. Wang, X.; Wang, H.; Yan, S.; Li, L.; Meng, C. Simulation for Surveillance Radar Ground Clutter at Low Grazing Angle. In Proceedings of the 2012 International Conference on Image Analysis and Signal Processing, Huangzhou, China, 9–11 November 2012; pp. 1–4. [Google Scholar]
  14. Shnidman, D.A. Generalized Radar Clutter Model. IEEE Trans. Aerosp. Electron. Syst. 2002, 35, 857–865. [Google Scholar] [CrossRef]
  15. Zhong, C.; Jiang, X.; Qu, F.; Zhang, Z. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis. IEEE Trans. Wirel. Commun. 2017, 16, 4585–4599. [Google Scholar] [CrossRef]
  16. Kay, S.M. Fundamentals of Statistical Signal Processing: Detection Theory; Prentice Hall PTR: Hoboken, NJ, USA, 1998. [Google Scholar]
  17. Proakis, J.G. Digital Communications, 4th ed.; McGraw-Hill: New York, NY, USA, 2001. [Google Scholar]
  18. Datta, B.N. Numerical Linear Algebra and Applications; SIAM: Delhi, India, 2010. [Google Scholar]
  19. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar] [CrossRef]
  20. Lu, Z.; Mei, S. First-order Penalty Methods for Bilevel Optimization. SIAM J. Optim. 2024, 34, 1937–1969. [Google Scholar] [CrossRef]
  21. Bekkerman, I.; Tabrikian, J. Target detection and localization using MIMO radars and sonars. IEEE Trans. Signal Process. 2006, 54, 3873–3883. [Google Scholar] [CrossRef]
  22. Liu, F.; Masouros, C.; Li, A.; Ratnarajah, T. Robust MIMO beamforming for cellular and radar coexistence. IEEE Wirel. Commun. Lett. 2017, 6, 374–377. [Google Scholar] [CrossRef]
  23. Liu, F.; Cui, Y.; Masouros, C.; Xu, J.; Han, T.X.; Eldar, Y.C.; Buzzi, S.; Swindlehurst, A.L. Integrated Sensing and Communications: Toward Dual-Functional Wireless Networks for 6G and Beyond. IEEE J. Sel. Areas Commun. 2022, 40, 1728–1767. [Google Scholar] [CrossRef]
  24. Zheng, G.; Ma, S.; Wong, K.-K.; Ng, T.-S. Robust beamforming in the MISO downlink with quadratic channel estimation and optimal training. IEEE Trans. Wirel. Commun. 2009, 8, 1067–1072. [Google Scholar] [CrossRef]
Figure 1. A legitimate surveillance system with radar function.
Figure 1. A legitimate surveillance system with radar function.
Sensors 25 04238 g001
Figure 2. The bilevel optimization framework.
Figure 2. The bilevel optimization framework.
Sensors 25 04238 g002
Figure 3. Convergence behavior of the bilevel algorithm.
Figure 3. Convergence behavior of the bilevel algorithm.
Sensors 25 04238 g003
Figure 4. Performance versus noise power.
Figure 4. Performance versus noise power.
Sensors 25 04238 g004
Figure 5. Performance versus the number of RF chains.
Figure 5. Performance versus the number of RF chains.
Sensors 25 04238 g005
Figure 6. Performance versus the number of antennas.
Figure 6. Performance versus the number of antennas.
Sensors 25 04238 g006
Figure 7. Performance versus Rician K-factor.
Figure 7. Performance versus Rician K-factor.
Sensors 25 04238 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xue, T.; Lu, W.; Zhang, M.; He, Y.; Cai, Y.; Yu, G. Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities. Sensors 2025, 25, 4238. https://doi.org/10.3390/s25134238

AMA Style

Xue T, Lu W, Zhang M, He Y, Cai Y, Yu G. Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities. Sensors. 2025; 25(13):4238. https://doi.org/10.3390/s25134238

Chicago/Turabian Style

Xue, Tingyue, Wenhao Lu, Mianyi Zhang, Yinghui He, Yunlong Cai, and Guanding Yu. 2025. "Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities" Sensors 25, no. 13: 4238. https://doi.org/10.3390/s25134238

APA Style

Xue, T., Lu, W., Zhang, M., He, Y., Cai, Y., & Yu, G. (2025). Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities. Sensors, 25(13), 4238. https://doi.org/10.3390/s25134238

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop