{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:16:06Z","timestamp":1773465366558,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078834","type":"print"},{"value":"9783032078841","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07884-1_22","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:45Z","timestamp":1760286165000},"page":"430-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation"],"prefix":"10.1007","author":[{"given":"Jiali","family":"Xu","sequence":"first","affiliation":[]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Loscri","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/s24020641","author":"L Alhoraibi","year":"2024","unstructured":"Alhoraibi, L., Alghazzawi, D., Alhebshi, R.: Generative adversarial network-based data augmentation for enhancing wireless physical layer authentication. Sensors (2024). https:\/\/doi.org\/10.3390\/s24020641","journal-title":"Sensors"},{"issue":"1","key":"22_CR2","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSYST.2016.2630691","volume":"12","author":"KLM Ang","year":"2018","unstructured":"Ang, K.L.M., Seng, J.K.P., Zungeru, A.M.: Optimizing energy consumption for big data collection in large-scale wireless sensor networks with mobile collectors. IEEE Syst. J. 12(1), 616\u2013626 (2018). https:\/\/doi.org\/10.1109\/JSYST.2016.2630691","journal-title":"IEEE Syst. J."},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Bashar, M.A., Nayak, R.: Tanogan: time series anomaly detection with generative adversarial networks. In: 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1778\u20131785 (2020). https:\/\/doi.org\/10.1109\/SSCI47803.2020.9308512","DOI":"10.1109\/SSCI47803.2020.9308512"},{"key":"22_CR4","unstructured":"Briol, F.X., Barp, A., Duncan, A.B., Girolami, M.: Statistical inference for generative models with maximum mean discrepancy (2019). https:\/\/arxiv.org\/abs\/1906.05944"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artifi. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artifi. Intell. Res."},{"issue":"2","key":"22_CR6","doi-asserted-by":"publisher","first-page":"360","DOI":"10.3390\/electronics13020360","volume":"13","author":"B Chen","year":"2024","unstructured":"Chen, B., Ma, J., Zhang, L., Zhou, J., Fan, J., Lan, H.: Research progress of wireless positioning methods based on RSSI. Electronics 13(2), 360 (2024)","journal-title":"Electronics"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Chi, G., et al.: Rf-diffusion: radio signal generation via time-frequency diffusion. In: Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2024. Association for Computing Machinery (2024). https:\/\/doi.org\/10.1145\/3636534.3649348","DOI":"10.1145\/3636534.3649348"},{"issue":"9","key":"22_CR8","doi-asserted-by":"publisher","first-page":"6390","DOI":"10.1109\/TNNLS.2021.3136503","volume":"34","author":"D Dablain","year":"2023","unstructured":"Dablain, D., Krawczyk, B., Chawla, N.V.: Deepsmote: fusing deep learning and smote for imbalanced data. IEEE Trans. Neural Netw. Learn. Syst. 34(9), 6390\u20136404 (2023). https:\/\/doi.org\/10.1109\/TNNLS.2021.3136503","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"22_CR9","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014)"},{"key":"22_CR10","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of wasserstein gans. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems. vol.\u00a030. Curran Associates, Inc. (2017)"},{"key":"22_CR11","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: Gans trained by a two time-scale update rule converge to a local nash equilibrium. In: Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017)"},{"issue":"8","key":"22_CR12","doi-asserted-by":"publisher","first-page":"7956","DOI":"10.1109\/TCYB.2021.3054161","volume":"52","author":"H Hoeltgebaum","year":"2022","unstructured":"Hoeltgebaum, H., Adams, N., Fernandes, C.: Estimation, forecasting, and anomaly detection for nonstationary streams using adaptive estimation. IEEE Trans. Cybernet. 52(8), 7956\u20137967 (2022). https:\/\/doi.org\/10.1109\/TCYB.2021.3054161","journal-title":"IEEE Trans. Cybernet."},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Iftikhar, U., Ali, S.A.: Enhanced cyber threat detection system leveraging machine learning using data augmentation. Inter. J. Adv. Comput. Sci. Appli. 16(2) (2025).https:\/\/doi.org\/10.14569\/IJACSA.2025.0160223","DOI":"10.14569\/IJACSA.2025.0160223"},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Jiang, X., et al.: Netdiffusion: network data augmentation through protocol-constrained traffic generation. Proc. ACM Meas. Anal. Comput. Syst. 8(1) (2024) https:\/\/doi.org\/10.1145\/3639037","DOI":"10.1145\/3639037"},{"issue":"3","key":"22_CR15","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/JSYST.2019.2935457","volume":"14","author":"Q Jin","year":"2020","unstructured":"Jin, Q., Lin, R., Yang, F.: E-wacgan: enhanced generative model of signaling data based on wgan-gp and acgan. IEEE Syst. J. 14(3), 3289\u20133300 (2020). https:\/\/doi.org\/10.1109\/JSYST.2019.2935457","journal-title":"IEEE Syst. J."},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jnca.2016.08.002","volume":"73","author":"A Karkouch","year":"2016","unstructured":"Karkouch, A., Mousannif, H., Moatassime, H.A., Noel, T.: Data quality in internet of things: a state-of-the-art survey. J. Netw. Comput. Appl. 73, 57\u201381 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-65414-6_11","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"J Kim","year":"2020","unstructured":"Kim, J., Jeong, K., Choi, H., Seo, K.: GAN-based anomaly detection in imbalance problems. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020. LNCS, vol. 12540, pp. 128\u2013145. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65414-6_11"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Kim, K.: Gan based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems. Inter. J. Eng. Res. Technol. 13, 3987 (2020). https:\/\/doi.org\/10.37624\/IJERT\/13.11.2020.3987-3996","DOI":"10.37624\/IJERT\/13.11.2020.3987-3996"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Kim, K.: Gan based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems. Inter. J. Eng. Res. Technol. 13, 3987 (11 2020).https:\/\/doi.org\/10.37624\/IJERT\/13.11.2020.3987-3996","DOI":"10.37624\/IJERT\/13.11.2020.3987-3996"},{"issue":"5","key":"22_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.011.2200707","volume":"62","author":"K Kousias","year":"2024","unstructured":"Kousias, K., et al.: A large-scale dataset of 4g, nb-iot, and 5g non-standalone network measurements. IEEE Commun. Mag. 62(5), 44\u201349 (2024). https:\/\/doi.org\/10.1109\/MCOM.011.2200707","journal-title":"IEEE Commun. Mag."},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Lemieszewski, t., Hannebauer, D., Remiszewski, G.: Vulnerability of wi-fi wireless network to signal interference. J. Eng. 360(1), 58\u201365 (2024). https:\/\/doi.org\/10.5604\/01.3001.0054.8861","DOI":"10.5604\/01.3001.0054.8861"},{"key":"22_CR22","doi-asserted-by":"publisher","unstructured":"Maduranga, M., Oruthota, U., Lakmal, H., Kulatunga, S.: Rssi-based indoor localization using deep learning with a custom loss function. In: 2024 8th SLAAI International Conference on Artificial Intelligence (SLAAI-ICAI), pp.\u00a01\u20135 (2024) https:\/\/doi.org\/10.1109\/SLAAI-ICAI63667.2024.10844973","DOI":"10.1109\/SLAAI-ICAI63667.2024.10844973"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Marfievici, R., Murphy, A.L., Picco, G.P., Ossi, F., Cagnacci, F.: How environmental factors impact outdoor wireless sensor networks: A case study. In: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 565\u2013573 (2013) https:\/\/doi.org\/10.1109\/MASS.2013.13","DOI":"10.1109\/MASS.2013.13"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Naghdi, S., O\u2019Keefe, K.: Combining multichannel RSSI and vision with artificial neural networks to improve BLE trilateration. Sensors 22(12), 4320 (2022)","DOI":"10.3390\/s22124320"},{"issue":"3","key":"22_CR25","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C O\u2019Reilly","year":"2014","unstructured":"O\u2019Reilly, C., Gluhak, A., Imran, M.A., Rajasegarar, S.: Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun. Surv. Tutorials 16(3), 1413\u20131432 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.112813.00168","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"22_CR26","unstructured":"Pham, T.M.T., Premkumar, K., Naili, M., Yang, J.: Time to retrain? detecting concept drifts in machine learning systems (2024). https:\/\/arxiv.org\/abs\/2410.09190"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Phung, C.D., Yellas, N.E.H., Ruba, S.B., Secci, S.: An open dataset for beyond-5g data-driven network automation experiments. In: 2022 1st International Conference on 6G Networking (6GNet), pp.\u00a01\u20134 (2022). https:\/\/doi.org\/10.1109\/6GNet54646.2022.9830292","DOI":"10.1109\/6GNet54646.2022.9830292"},{"issue":"8","key":"22_CR28","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/TKDE.2015.2411594","volume":"27","author":"U Raza","year":"2015","unstructured":"Raza, U., Camerra, A., Murphy, A.L., Palpanas, T., Picco, G.P.: Practical data prediction for real-world wireless sensor networks. IEEE Trans. Knowl. Data Eng. 27(8), 2231\u20132244 (2015). https:\/\/doi.org\/10.1109\/TKDE.2015.2411594","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Schummer, P., del Rio, A., Serrano, J., Jimenez, D., Sanchez, G., Llorente, A.: Machine learning-based network anomaly detection: design, implementation, and evaluation. AI (2024https:\/\/doi.org\/10.3390\/ai5040143","DOI":"10.3390\/ai5040143"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Song, H., Jiang, Z., Men, A., Yang, B.: A hybrid semi-supervised anomaly detection model for high-dimensional data. Comput. Intell. Neurosc. 2017(1), 8501683 (2017). _eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2017\/8501683","DOI":"10.1155\/2017\/8501683"},{"key":"22_CR31","unstructured":"Talagala, P.D., Hyndman, R.J., Smith-Miles, K.: Anomaly Detection in High-Dimensional Data. J. Comput. Graph. Statist. (Jun 2021)"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Tedeschi, P., Oligeri, G., Di\u00a0Pietro, R.: Localization of a power-modulated jammer. Sensors 22(2), 646 (2022)","DOI":"10.3390\/s22020646"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2021.3059321","volume":"70","author":"S Wang","year":"2021","unstructured":"Wang, S., Li, C., Lim, A.: A model for non-stationary time series and its applications in filtering and anomaly detection. IEEE Trans. Instrum. Meas. 70, 1\u201311 (2021). https:\/\/doi.org\/10.1109\/TIM.2021.3059321","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"22_CR34","unstructured":"Wen, J., et al.: Generative ai for data augmentation in wireless networks: analysis, applications, and case study (2024). https:\/\/arxiv.org\/abs\/2411.08341"},{"key":"22_CR35","doi-asserted-by":"publisher","unstructured":"Wong, C., Wang, M., Hossain, M.F., Munasinghe, K.: Internet of things anomaly detection enhancement using gan-based data augmentation. In: 2024 17th International Conference on Signal Processing and Communication System (ICSPCS) (2024). https:\/\/doi.org\/10.1109\/ICSPCS63175.2024.10815773","DOI":"10.1109\/ICSPCS63175.2024.10815773"},{"key":"22_CR36","doi-asserted-by":"publisher","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34(4), 1302\u20131325 (2011). https:\/\/doi.org\/10.1016\/j.jnca.2011.03.004, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804511000580, advanced Topics in Cloud Computing","DOI":"10.1016\/j.jnca.2011.03.004"},{"key":"22_CR37","doi-asserted-by":"publisher","unstructured":"Xu, J., Dai, H., Ying, W.h.: Multi-layer neural network for received signal strength-based indoor localisation. IET Commun. 10 (2016). https:\/\/doi.org\/10.1049\/iet-com.2015.0469","DOI":"10.1049\/iet-com.2015.0469"},{"key":"22_CR38","doi-asserted-by":"publisher","unstructured":"Yang, M., Zhang, J.: Data anomaly detection in the internet of things: a review of current trends and research challenges. Inter. J. Adv. Comput. Sci. Appli. 14 (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0140901","DOI":"10.14569\/IJACSA.2023.0140901"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07884-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:48Z","timestamp":1760286168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07884-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032078834","9783032078841"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07884-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}