“…In the existing literature, there have been a pile of works investigating DFRC from different perspective, including the waveform design, resource allocation, joint beamforming, and capacity characterization, to name a few; see the recent survey papers [1,2] for the details. However, the information security aspect of DFRC is relatively less investigated, except for a few recent works [4,6,7,11,14,15]. Since DFRC employs a single waveform to simultaneously detect the target and send information to the communication user (CU), the information embedded in the waveform has a risk to leak to the malicious target.…”