{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T23:49:04Z","timestamp":1775000944315,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10586-024-04921-6","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T08:30:49Z","timestamp":1737448249000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network"],"prefix":"10.1007","volume":"28","author":[{"given":"Javad","family":"Zarean","sequence":"first","affiliation":[]},{"given":"AmirReza","family":"Tajally","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Tavakkoli-Moghaddam","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Kia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"key":"4921_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101788","volume":"93","author":"A Jalaly Bidgoly","year":"2020","unstructured":"Jalaly Bidgoly, A., Jalaly Bidgoly, H., Arezoumand, Z.: A survey on methods and challenges in EEG based authentication. Comput. Secur. 93, 101788 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101788","journal-title":"Comput. Secur."},{"key":"4921_CR2","doi-asserted-by":"publisher","first-page":"5229576","DOI":"10.1155\/2021\/5229576","volume":"2021","author":"S Zhang","year":"2021","unstructured":"Zhang, S., Sun, L., Mao, X., Hu, C., Liu, P.: Review on EEG-based authentication technology. Comput. Intell. Neurosci. 2021, 5229576 (2021). https:\/\/doi.org\/10.1155\/2021\/5229576","journal-title":"Comput. Intell. Neurosci."},{"key":"4921_CR3","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/J.ESWA.2019.01.080","volume":"125","author":"Y Sun","year":"2019","unstructured":"Sun, Y., Lo, F.P.W., Lo, B.: EEG-based user identification system using 1D-convolutional long short-term memory neural networks. Expert Syst. Appl. 125, 259\u2013267 (2019). https:\/\/doi.org\/10.1016\/J.ESWA.2019.01.080","journal-title":"Expert Syst. Appl."},{"key":"4921_CR4","doi-asserted-by":"crossref","unstructured":"Gui, Q., Jin, Z., Xu, W., Ruiz-Blondet, M. V., Laszlo, S.: Multichannel EEG-based biometric using improved RBF neural networks. In: 2015 IEEE Signal Processing in Medicine and Biology Symposium (SPMB) IEEE, 1\u20136 Dec 2015","DOI":"10.1109\/SPMB.2015.7405418"},{"key":"4921_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3253026","author":"CA Fidas","year":"2023","unstructured":"Fidas, C.A., Lyras, D.: A review of EEG-based user authentication: trends and future research directions. IEEE Access (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3253026","journal-title":"IEEE Access"},{"issue":"4","key":"4921_CR6","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","volume":"29","author":"S Marcel","year":"2007","unstructured":"Marcel, S., del Millan, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743\u2013748 (2007). https:\/\/doi.org\/10.1109\/TPAMI.2007.1012","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"4921_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/J.PATREC.2021.01.004","volume":"143","author":"E Maiorana","year":"2021","unstructured":"Maiorana, E.: Learning deep features for task-independent EEG-based biometric verification. Pattern Recogn. Lett. 143, 122\u2013129 (2021). https:\/\/doi.org\/10.1016\/J.PATREC.2021.01.004","journal-title":"Pattern Recogn. Lett."},{"key":"4921_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.eswa.2016.06.006","volume":"62","author":"D Rodrigues","year":"2016","unstructured":"Rodrigues, D., Silva, G.F.A., Papa, J.P., Marana, A.N., Yang, X.S.: EEG-based person identification through binary flower pollination algorithm. Expert Syst. Appl. 62, 81\u201390 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2016.06.006","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"4921_CR9","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TIFS.2018.2850320","volume":"14","author":"R Das","year":"2018","unstructured":"Das, R., Piciucco, E., Maiorana, E., Campisi, P.: Convolutional neural network for finger-vein-based biometric identification. IEEE Trans. Inf. Forensics Secur. 14(2), 360\u2013373 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4921_CR10","doi-asserted-by":"publisher","unstructured":"Ramzan, Q., Shidlovskiy, S.: Evolution of the brain computing interface (BCI) and proposed electroencephalography (EEG) signals based authentication model. In Proceedings of the MATEC Web of Conferences (155) 1006. EDP Sciences (2018) https:\/\/doi.org\/10.1051\/matecconf\/201815501006.","DOI":"10.1051\/matecconf\/201815501006"},{"issue":"4","key":"4921_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSMC.2017.2702378","volume":"3","author":"CT Lin","year":"2017","unstructured":"Lin, C.T., Liu, Y.T., Wu, S.L., Cao, Z., Wang, Y.K., Huang, C.S., Chuang, C.H.: EEG-based brain-computer interfaces: a novel neurotechnology and computational intelligence method. IEEE Syst. Man Cybern. Mag. 3(4), 16\u201326 (2017). https:\/\/doi.org\/10.1109\/MSMC.2017.2702378","journal-title":"IEEE Syst. Man Cybern. Mag."},{"key":"4921_CR12","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.neucom.2020.06.009","volume":"410","author":"E Maiorana","year":"2020","unstructured":"Maiorana, E.: Deep learning for EEG-based biometric recognition. Neurocomputing 410, 374\u2013386 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2020.06.009","journal-title":"Neurocomputing"},{"issue":"2","key":"4921_CR13","doi-asserted-by":"publisher","first-page":"225","DOI":"10.37936\/ecti-eec.2022202.246906","volume":"20","author":"TB Shams","year":"2022","unstructured":"Shams, T.B., Hossain, M.S., Mahmud, M.F., Tehjib, M.S., Hossain, Z., Pramanik, M.I.: EEG-based biometric authentication using machine learning: a comprehensive survey. ECTI Trans. Electr. Eng. Electron. Commun. 20(2), 225\u2013241 (2022)","journal-title":"ECTI Trans. Electr. Eng. Electron. Commun."},{"key":"4921_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/J.NEUCOM.2018.01.074","volume":"287","author":"JH Kang","year":"2018","unstructured":"Kang, J.H., Jo, Y.C., Kim, S.P.: Electroencephalographic feature evaluation for improving personal authentication performance. Neurocomputing 287, 93\u2013101 (2018). https:\/\/doi.org\/10.1016\/J.NEUCOM.2018.01.074","journal-title":"Neurocomputing"},{"issue":"11","key":"4921_CR15","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1007\/s11517-022-02658-1","volume":"60","author":"SG Khalid","year":"2022","unstructured":"Khalid, S.G., Ali, S.M., Liu, H., Qurashi, A.G., Ali, U.: Photoplethysmography temporal marker-based machine learning classifier for anesthesia drug detection. Med. Biol. Eng. Compu. 60(11), 3057\u20133068 (2022). https:\/\/doi.org\/10.1007\/s11517-022-02658-1","journal-title":"Med. Biol. Eng. Compu."},{"issue":"1","key":"4921_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11517-022-02686-x","volume":"61","author":"G Xu","year":"2023","unstructured":"Xu, G., Guo, W., Wang, Y.: Subject-independent EEG emotion recognition with hybrid spatial-temporal GRU-Conv architecture. Med. Biol. Eng. Compu. 61(1), 61\u201373 (2023). https:\/\/doi.org\/10.1007\/s11517-022-02686-x","journal-title":"Med. Biol. Eng. Compu."},{"issue":"6","key":"4921_CR17","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1007\/s11517-023-02793-3","volume":"61","author":"Y Shang","year":"2023","unstructured":"Shang, Y., Gao, X., An, A.: Multi-band spatial feature extraction and classification for motor imaging EEG signals based on OSFBCSP-GAO-SVM model. Med. Biol. Eng. Compu. 61(6), 1581\u20131602 (2023). https:\/\/doi.org\/10.1007\/s11517-023-02793-3","journal-title":"Med. Biol. Eng. Compu."},{"key":"4921_CR18","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ins.2017.11.045","volume":"430\u2013431","author":"R Saini","year":"2018","unstructured":"Saini, R., Kaur, B., Singh, P., Kumar, P., Roy, P.P., Raman, B., Singh, D.: Don\u2019t just sign use brain too: a novel multimodal approach for user identification and verification. Inf. Sci. (NY) 430\u2013431, 163\u2013178 (2018). https:\/\/doi.org\/10.1016\/j.ins.2017.11.045","journal-title":"Inf. Sci. (NY)"},{"key":"4921_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2022.103790","volume":"77","author":"R Ashenaei","year":"2022","unstructured":"Ashenaei, R., Asghar Beheshti, A., Yousefi Rezaii, T.: Stable EEG-based biometric system using functional connectivity based on time-frequency features with optimal channels. Biomed. Signal Process. Control 77, 103790 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2022.103790","journal-title":"Biomed. Signal Process. Control"},{"issue":"15","key":"4921_CR20","doi-asserted-by":"publisher","first-page":"6537","DOI":"10.1016\/j.eswa.2014.05.013","volume":"41","author":"M Del Pozo-Banos","year":"2014","unstructured":"Del Pozo-Banos, M., Alonso, J.B., Ticay-Rivas, J.R., Travieso, C.M.: Electroencephalogram subject identification: a review. Expert Syst. Appl. 41(15), 6537\u20136554 (2014). https:\/\/doi.org\/10.1016\/j.eswa.2014.05.013","journal-title":"Expert Syst. Appl."},{"key":"4921_CR21","doi-asserted-by":"publisher","first-page":"42113","DOI":"10.1109\/ACCESS.2019.2907644","volume":"7","author":"Y Di","year":"2019","unstructured":"Di, Y., An, X., He, F., Liu, S., Ke, Y., Ming, D.: Robustness analysis of identification using resting-state EEG signals. IEEE Access 7, 42113\u201342122 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2907644","journal-title":"IEEE Access"},{"issue":"24","key":"4921_CR22","doi-asserted-by":"publisher","first-page":"25581","DOI":"10.1007\/s11042-016-4232-2","volume":"76","author":"B Kaur","year":"2017","unstructured":"Kaur, B., Singh, D., Roy, P.P.: A novel framework of EEG-based user identification by analyzing music-listening behavior. Multimedia Tools and Applications 76(24), 25581\u201325602 (2017). https:\/\/doi.org\/10.1007\/s11042-016-4232-2","journal-title":"Multimedia Tools and Applications"},{"key":"4921_CR23","doi-asserted-by":"crossref","unstructured":"Ma, L., Minett, J. W., Blu, T., & Wang, W. S.-Y.: Resting state EEG-based biometrics for individual identification using convolutional neural networks, Proceedings of the Annual International Conference IEEE Engineering\u00a0in\u00a0Medicine\u00a0and\u00a0Biology Society, Milan, Italy, 2848\u20132851 August 2015","DOI":"10.1109\/EMBC.2015.7318985"},{"issue":"2","key":"4921_CR24","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1016\/j.eswa.2007.11.017","volume":"36","author":"S Chandaka","year":"2009","unstructured":"Chandaka, S., Chatterjee, A., Munshi, S.: Cross-correlation aided support vector machine classifier for classification of EEG signals. Expert Syst. Appl. 36(2), 1329\u20131336 (2009). https:\/\/doi.org\/10.1016\/j.eswa.2007.11.017","journal-title":"Expert Syst. Appl."},{"key":"4921_CR25","doi-asserted-by":"crossref","unstructured":"Mao, Z., Yao, W. X., & Huang, Y.: EEG-based biometric identification with deep learning (2017)","DOI":"10.1109\/NER.2017.8008425"},{"issue":"5","key":"4921_CR26","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/LSP.2019.2906826","volume":"26","author":"O \u00d6zdenizci","year":"2019","unstructured":"\u00d6zdenizci, O., Wang, Y., Koike-Akino, T., Erdo\u011fmu\u015f, D.: Adversarial deep learning in EEG biometrics. IEEE Signal Process. Lett. 26(5), 710\u2013714 (2019)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"4921_CR27","first-page":"177","volume":"9","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Mao, Z., Huang, Y., Xu, L., Ding, G.: Deep learning models for EEG-based rapid serial visual presentation event classification. J. Inf. Hiding Multi. Signal Proc. 9(1), 177\u2013187 (2018)","journal-title":"J. Inf. Hiding Multi. Signal Proc."},{"key":"4921_CR28","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.neucom.2015.04.025","volume":"166","author":"BC Armstrong","year":"2015","unstructured":"Armstrong, B.C., Ruiz-Blondet, M.V., Khalifian, N., Kurtz, K.J., Jin, Z., Laszlo, S.: Brainprint: assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics. Neurocomputing 166, 59\u201367 (2015). https:\/\/doi.org\/10.1016\/j.neucom.2015.04.025","journal-title":"Neurocomputing"},{"key":"4921_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2019.2924648","author":"T Wilaiprasitporn","year":"2018","unstructured":"Wilaiprasitporn, T., Ditthapron, A., Matchaparn, K., Tongbuasirilai, T., Banluesombatkul, N., Chuangsuwanich, E.: Affective EEG-based person identification using the deep learning approach. IEEE Trans. Cognit. Develop. Syst. (2018). https:\/\/doi.org\/10.1109\/TCDS.2019.2924648","journal-title":"IEEE Trans. Cognit. Develop. Syst."},{"key":"4921_CR30","unstructured":"Chorowski, J.K., Bahdanau, D., Serdyuk, D., Cho, K., Bengio, Y.: Attention-based models for speech recognition. In: Jordan, M.I., LeCun, Y., Solla, S.A. (eds.), Advances in Neural Information Processing Systems, pp. 577\u2013585, The MIT Press, Proceedings of the 29th Annual Conference on Neural Information Processing Systems (NIPS), Montreal, Canada, Dec 7\u201312 (2015)"},{"issue":"7","key":"4921_CR31","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIFS.2016.2543524","volume":"11","author":"MV Ruiz-Blondet","year":"2016","unstructured":"Ruiz-Blondet, M.V., Jin, Z., Laszlo, S.: CEREBRE: a novel method for very high accuracy event-related potential biometric identification. IEEE Trans. Inf. Forensics Secur. 11(7), 1618\u20131629 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2543524","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4921_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75193-1_72","author":"T Schons","year":"2018","unstructured":"Schons, T., Moreira, G.J.P., Silva, P.H.L., Coelho, V.N., Luz, E.J.S.: Convolutional network for EEG-based biometric. Lecture Notes Comput. Sci. (2018). https:\/\/doi.org\/10.1007\/978-3-319-75193-1_72","journal-title":"Lecture Notes Comput. Sci."},{"issue":"4","key":"4921_CR33","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1016\/j.ijleo.2015.09.020","volume":"127","author":"PK Sharma","year":"2016","unstructured":"Sharma, P.K., Vaish, A.: Individual identification based on neuro-signal using motor movement and imaginary cognitive process. Optik 127(4), 2143\u20132148 (2016). https:\/\/doi.org\/10.1016\/j.ijleo.2015.09.020","journal-title":"Optik"},{"key":"4921_CR34","doi-asserted-by":"crossref","unstructured":"Gui, Q., Jin, Z., & Xu, W.:Exploring EEG-based biometrics for user identification and authentication. In:\u00a02014 IEEE Signal Processing in Medicine and Biology Symposium (SPMB),\u00a0Philadelphia, Pennsylvania, USA, IEEE 13, 1\u20136 Dec (2014)","DOI":"10.1109\/SPMB.2014.7002950"},{"issue":"3","key":"4921_CR35","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-bmt.2014.0040","volume":"4","author":"M Abo-Zahhad","year":"2015","unstructured":"Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N.: State-of-the-art methods and future perspectives for personal recognition based on electroencephalogram signals. IET Biometrics 4(3), 179\u2013190 (2015). https:\/\/doi.org\/10.1049\/iet-bmt.2014.0040","journal-title":"IET Biometrics"},{"key":"4921_CR36","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1016\/j.patrec.2017.05.031","volume":"95","author":"MV Ruiz-Blondet","year":"2017","unstructured":"Ruiz-Blondet, M.V., Jin, Z., Laszlo, S.: Permanence of the CEREBRE brain biometric protocol. Pattern Recogn. Lett. 95, 1339\u20131351 (2017). https:\/\/doi.org\/10.1016\/j.patrec.2017.05.031","journal-title":"Pattern Recogn. Lett."},{"issue":"15\u201316","key":"4921_CR37","doi-asserted-by":"publisher","first-page":"10655","DOI":"10.1007\/s11042-019-7258-4","volume":"79","author":"JX Chen","year":"2020","unstructured":"Chen, J.X., Mao, Z.J., Yao, W.X., Huang, Y.F.: EEG-based biometric identification with convolutional neural network. Multi. Tools Appl. 79(15\u201316), 10655\u201310675 (2020). https:\/\/doi.org\/10.1007\/s11042-019-7258-4","journal-title":"Multi. Tools Appl."},{"key":"4921_CR38","doi-asserted-by":"publisher","unstructured":"Arnau-Gonz\u00e1lez, P., Katsigiannis, S., Ramzan, N., Tolson, D., & Arevalillo-Herrez, M.: ES1D: A deep network for EEG-based subject identification. In:\u00a02017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE),\u00a0Washington, DC, USA, 23-25 Oct (2017) https:\/\/doi.org\/10.1109\/BIBE.2017.00021","DOI":"10.1109\/BIBE.2017.00021"},{"issue":"19","key":"4921_CR39","doi-asserted-by":"publisher","first-page":"28157","DOI":"10.1007\/s11042-019-07905-6","volume":"78","author":"BB Das","year":"2019","unstructured":"Das, B.B., Kumar, P., Kar, D., Ram, S.K., Babu, K.S., Mohapatra, R.K.: A spatial-temporal model for EEG-based person identification. Multimed. Tools Appl. 78(19), 28157\u201328177 (2019). https:\/\/doi.org\/10.1007\/s11042-019-07905-6","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"4921_CR40","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TDSC.2021.3060775","volume":"19","author":"E Debie","year":"2021","unstructured":"Debie, E., Moustafa, N., Vasilakos, A.: Session invariant EEG signatures using elicitation protocol fusion and convolutional neural network. IEEE Trans. Dependable Secure Comput. 19(4), 2488\u20132500 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"4921_CR41","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TBME.2004.827072","volume":"51","author":"G Schalk","year":"2004","unstructured":"Schalk, G., McFarland, D.J., Hinterberger, T., Birbaumer, N., Wolpaw, J.R.: BCI2000: a general-purpose brain-computer interface (BCI) system. IEEE Trans. Biomed. Eng. 51(6), 1034\u20131043 (2004). https:\/\/doi.org\/10.1109\/TBME.2004.827072","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"4921_CR42","doi-asserted-by":"publisher","unstructured":"Cui, Y., Chen, Z., Wei, S., Wang, S., Liu, T., & Hu, G.: Attention-over-attention neural networks for reading comprehension. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers) (593\u2013602). Association for Computational Linguistics (ACL). (2017) https:\/\/doi.org\/10.18653\/v1\/P17-1055.","DOI":"10.18653\/v1\/P17-1055"},{"issue":"5","key":"4921_CR43","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/s12530-022-09464-y","volume":"14","author":"SP Porkodi","year":"2023","unstructured":"Porkodi, S.P., Sarada, V., Maik, V., Gurushankar, K.: Generic image application using GANs (Generative Adversarial Networks): a Review. Evol. Syst. 14(5), 903\u2013917 (2023). https:\/\/doi.org\/10.1007\/s12530-022-09464-y","journal-title":"Evol. Syst."},{"issue":"4","key":"4921_CR44","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s12530-020-09346-1","volume":"12","author":"Y Khaldi","year":"2021","unstructured":"Khaldi, Y., Benzaoui, A.: A new framework for grayscale ear images recognition using generative adversarial networks under unconstrained conditions. Evol. Syst. 12(4), 923\u2013934 (2021). https:\/\/doi.org\/10.1007\/s12530-020-09346-1","journal-title":"Evol. Syst."},{"issue":"2","key":"4921_CR45","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1007\/s10586-023-04063-1","volume":"27","author":"A Aleroud","year":"2024","unstructured":"Aleroud, A., Shariah, M., Malkawi, R., Khamaiseh, S.Y., Al-Alaj, A.: A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data. Clust. Comput. 27(2), 2117\u20132132 (2024). https:\/\/doi.org\/10.1007\/s10586-023-04063-1","journal-title":"Clust. Comput."},{"issue":"2","key":"4921_CR46","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s12530-023-09521-0","volume":"15","author":"R Li","year":"2024","unstructured":"Li, R., Gu, J.: OMGD-StarGAN: improvements to boost StarGAN v2 performance. Evol. Syst. 15(2), 455\u2013467 (2024). https:\/\/doi.org\/10.1007\/s12530-023-09521-0","journal-title":"Evol. Syst."},{"key":"4921_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04086-8","author":"A Jyothish","year":"2023","unstructured":"Jyothish, A., Mathew, A., Vinod, P.: Effectiveness of machine learning based android malware detectors against adversarial attacks. Clust. Comput. (2023). https:\/\/doi.org\/10.1007\/s10586-023-04086-8","journal-title":"Clust. Comput."},{"key":"4921_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102902","volume":"122","author":"H Tian","year":"2022","unstructured":"Tian, H., Zhu, T., Zhou, W.: Fairness and privacy preservation for facial images: GAN-based methods. Comput. Secur. 122, 102902 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102902","journal-title":"Comput. Secur."},{"key":"4921_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733","volume":"139","author":"W Lim","year":"2024","unstructured":"Lim, W., Yong, K.S.C., Lau, B.T., Tan, C.C.L.: Future of generative adversarial networks (GAN) for anomaly detection in network security: a review. Comput. Secur. 139, 103733 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103733","journal-title":"Comput. Secur."},{"key":"4921_CR50","doi-asserted-by":"publisher","unstructured":"Bahdanau, D., Chorowski, J., Serdyuk, D., Brakel, P., Bengio, Y:.\u201dEnd-to-end attention-based large vocabulary speech recognition, \u201cIEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, 20\u201325 March 2016,4945\u20134949, (2016) https:\/\/doi.org\/10.1109\/ICASSP.2016.7472618","DOI":"10.1109\/ICASSP.2016.7472618"},{"key":"4921_CR51","doi-asserted-by":"crossref","unstructured":"Bello, I., Zoph, B., Vaswani, A., Shlens, J., & Le, Q. V.: Attention augmented convolutional networks. In: Proceedings of the IEEE\/CVF international conference on computer vision (3286\u20133295) (2019)","DOI":"10.1109\/ICCV.2019.00338"},{"key":"4921_CR52","doi-asserted-by":"crossref","unstructured":"Wu, B., Meng, W., & Chiu, W. Y.: Towards enhanced EEG-based authentication with motor imagery brain-computer interface. In: Proceedings of the 38th Annual Computer Security Applications Conference, Austin TX, USA, 799\u2013812 Dec (2022)","DOI":"10.1145\/3564625.3564656"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04921-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04921-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04921-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:52:20Z","timestamp":1747777940000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04921-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4921"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04921-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]},"assertion":[{"value":"17 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors certify that they have no affiliation with or involvement with human participants or animals performed by any of the authors in any organization or entity with any financial or non-financial interest in the subject matter or materials discussed in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"168"}}