2019
DOI: 10.1007/s10462-019-09717-4
|View full text |Cite
|
Sign up to set email alerts
|

A review of generative adversarial networks and its application in cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 103 publications
(39 citation statements)
references
References 13 publications
0
30
0
Order By: Relevance
“…GAN's have become of interest in cybersecurity especially as DL continues to be a ML methodology of choice in recent years. Yinka-Banjo et al [97] posited that the application of GAN's in cybersecurity is a developing research field. They authors in [99] also stated that beyond the possibility of GANs to generate fake data to fool a security system, they can also be used to defend systems.…”
Section: B Generative Adversarial Network (Gan) For Resilient Cpsmentioning
confidence: 99%
“…GAN's have become of interest in cybersecurity especially as DL continues to be a ML methodology of choice in recent years. Yinka-Banjo et al [97] posited that the application of GAN's in cybersecurity is a developing research field. They authors in [99] also stated that beyond the possibility of GANs to generate fake data to fool a security system, they can also be used to defend systems.…”
Section: B Generative Adversarial Network (Gan) For Resilient Cpsmentioning
confidence: 99%
“…This is accomplished through evaluating the probability of the data being in one category given certain features, p (category|feature). GANs are often used in cybersecurity and health diagnostics [48,49].…”
Section: Supervised Learning (Labeled Data)mentioning
confidence: 99%
“…In the context of image processing and computer vision, GANs have been applied to fake image generation, super resolution, image synthesis and manipulation, texture synthesis, object detection, and video applications. 25 The framework presented in this paper falls into the category of fake image generation.…”
Section: Generative Adversarial Networkmentioning
confidence: 99%