2020
DOI: 10.1080/02564602.2020.1854058
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Application of GANs in Cybersecurity Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The KNN technique is an easy and effective way to classify multiclass objects by using Euclidean distances in the feature space and the proximity of training samples. 20,21 Considering a group of observations and target values (X 1 , Y 1 ), (X 2 , Y 2 ) … (X n , Y n ), where the set of observations, X n Z d and target values Y n (0, 1). As a result, for a particular size of n, k-NN evaluates the k nearest points of the test sequence inside the training samples and uses the label classes to predict the vector test class.…”
Section: K-nearest Neighbormentioning
confidence: 99%
See 1 more Smart Citation
“…The KNN technique is an easy and effective way to classify multiclass objects by using Euclidean distances in the feature space and the proximity of training samples. 20,21 Considering a group of observations and target values (X 1 , Y 1 ), (X 2 , Y 2 ) … (X n , Y n ), where the set of observations, X n Z d and target values Y n (0, 1). As a result, for a particular size of n, k-NN evaluates the k nearest points of the test sequence inside the training samples and uses the label classes to predict the vector test class.…”
Section: K-nearest Neighbormentioning
confidence: 99%
“…The KNN technique is an easy and effective way to classify multiclass objects by using Euclidean distances in the feature space and the proximity of training samples 20,21 . Considering a group of observations and target values (X 1 , Y 1 ), (X 2 , Y 2 ) … (X n , Y n ), where the set of observations, X n є Z d and target values Y n є (0, 1).…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…Miao et al [63] used crowdsourcing to demonstrate the effectiveness of generative poisoning attack especially when the data points/datasets are huge/large. Arora et al [64] presented a systematic literature review of GANs applications in the cybersecurity domain, including an analysis of specific extended GAN frameworks and currently used stable cybersecurity datasets. Their work compared how security professionals are employing GANs to produce amazing results in fields, such as Intrusion Detection, Steganography, Password Cracking, and Anomaly Generation.…”
Section: Related Workmentioning
confidence: 99%
“…This GAN uses an enhanced domainattention module (DAM) to create a longer range dependency between two domains while using fewer parameters and less memory. Additionally, GANs are becoming more and more popular in the fields of medical image processing for tasks like segmentation and classification [33], cybersecurity [34], time series and sequence generation [35] as well as for speech processing [36]. GANs have been used in the field of medical imaging for analyzing images from radiography, computerized tomography (CT) scans, and magnetic resonance imaging (MRI).…”
Section: Related Workmentioning
confidence: 99%