2020 11th IEEE Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2020
DOI: 10.1109/uemcon51285.2020.9298135
|View full text |Cite
|
Sign up to set email alerts
|

Generative Adversarial Networks in Security: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…The usage of a GAN as a defense mechanism renders the model more robust against future attacks. The main objective of a GAN is to detect unknown or unseen attacks and protect systems from various vulnerabilities [18]. In a zero sum game context, a GAN has two NNs competing against each other.…”
Section: Gan-based Defense Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…The usage of a GAN as a defense mechanism renders the model more robust against future attacks. The main objective of a GAN is to detect unknown or unseen attacks and protect systems from various vulnerabilities [18]. In a zero sum game context, a GAN has two NNs competing against each other.…”
Section: Gan-based Defense Methodologymentioning
confidence: 99%
“…Many research papers have employed GANs to either enhance IDS or to design novel attack instances such as generating adversarial malware samples [16,17]. However, there are only a few works on GAN-based intrusion detection [18].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The GAN networks are found to be highly capable of producing plausible results across a wider range of diverse domain applications. The applications such as security [54,55], baggage inspection [56], infected leaf identification [57], covid-19 prediction [58], agriculture [59], business process monitoring [60], Brain MRI synthesis [61], flood visualization [62], estimating the standards of gold [63], ECG wave synthesis [64], Internet of Things (IoT) [65] and Dengue Fever sampling [66].…”
Section: Table 1: Comparison Of Existing Sl Recognition Frameworkmentioning
confidence: 99%
“…GANs have performed well in tasks like image generation and speech synthesis, but have only a few use cases in cybersecurity as surveyed by Dutta et al in [13]. To understand what cybersecurity refers to in the context of this work, the next subsection will explain the background.…”
Section: A Generative Adversarial Networkmentioning
confidence: 99%