{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:32:20Z","timestamp":1759332740071},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11235-024-01166-x","type":"journal-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T03:54:53Z","timestamp":1717473293000},"page":"305-331","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Generative adversarial networks-based security and applications in cloud computing: a survey"],"prefix":"10.1007","volume":"86","author":[{"given":"Shiyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ming","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guofeng","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,4]]},"reference":[{"key":"1166_CR1","doi-asserted-by":"crossref","unstructured":"Khorshed, M. T., Ali, A., & Wasimi, S. A. (2011). Trust issues that create threats for cyber attacks in cloud computing. In: Proceedings of the 2011 IEEE 17th international conference on parallel and distributed systems (ICPADS). pp. 900\u2013905. IEEE.","DOI":"10.1109\/ICPADS.2011.156"},{"issue":"7","key":"1166_CR2","doi-asserted-by":"publisher","first-page":"768","DOI":"10.3390\/electronics8070768","volume":"8","author":"LM Dang","year":"2019","unstructured":"Dang, L. M., Piran, M. J., Han, D., Min, K., & Moon, H. (2019). A survey on Internet of Things and cloud computing for healthcare. Electronics, 8(7), 768. https:\/\/doi.org\/10.3390\/electronics8070768","journal-title":"Electronics"},{"issue":"2","key":"1166_CR3","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.jobcr.2021.01.015","volume":"11","author":"M Javaid","year":"2021","unstructured":"Javaid, M., & Khan, I. H. (2021). Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. Journal of Oral Biology and Craniofacial Research, 11(2), 209\u2013214. https:\/\/doi.org\/10.1016\/j.jobcr.2021.01.015","journal-title":"Journal of Oral Biology and Craniofacial Research"},{"issue":"5","key":"1166_CR4","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1109\/JBHI.2018.2799198","volume":"22","author":"A Jindal","year":"2018","unstructured":"Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing. IEEE Journal of Biomedical and Health Informatics, 22(5), 1605\u20131618. https:\/\/doi.org\/10.1109\/JBHI.2018.2799198","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"4","key":"1166_CR5","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.3390\/app12042160","volume":"12","author":"S Malik","year":"2022","unstructured":"Malik, S., Tahir, M., Sardaraz, M., & Alourani, A. (2022). A resource utilization prediction model for cloud data centers using evolutionary algorithms and machine learning techniques. Applied Sciences, 12(4), 2160. https:\/\/doi.org\/10.3390\/app12042160","journal-title":"Applied Sciences"},{"issue":"3","key":"1166_CR6","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s12045-014-0030-1","volume":"19","author":"V Rajaraman","year":"2014","unstructured":"Rajaraman, V. (2014). Cloud computing. Resonance, 19(3), 242\u2013258. https:\/\/doi.org\/10.1007\/s12045-014-0030-1","journal-title":"Resonance"},{"issue":"1","key":"1166_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/electronics11010016","volume":"11","author":"W Ahmad","year":"2022","unstructured":"Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2022). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics, 11(1), 16. https:\/\/doi.org\/10.3390\/electronics11010016","journal-title":"Electronics"},{"issue":"11","key":"1166_CR8","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139\u2013144. https:\/\/doi.org\/10.1145\/3422622","journal-title":"Communications of the ACM"},{"key":"1166_CR9","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., & Perez-Cruz, F. (2017). Deep models under the GAN: Information leakage from collaborative deep learning. In: Proceedings of the computer and communications security.","DOI":"10.1145\/3133956.3134012"},{"issue":"4","key":"1166_CR10","first-page":"25","volume":"22","author":"J Duffy","year":"2006","unstructured":"Duffy, J. (2006). Game theory and nash equilibrium. Natural Science Journal of Harbin Normal University, 22(4), 25\u201328.","journal-title":"Natural Science Journal of Harbin Normal University"},{"key":"1166_CR11","unstructured":"Goodfellow, I. (2016). NIPS 2016 tutorial: Generative adversarial networks."},{"key":"1166_CR12","unstructured":"Radford, A., Metz, L., Chintala, S. (2015). Unsupervised representation learning with deep convolutional generative adversarial networks. Computer Ence."},{"key":"1166_CR13","doi-asserted-by":"publisher","unstructured":"Arjovsky, M., Chintala, S., & Bottou, L. (2017). Wasserstein GAN. https:\/\/doi.org\/10.48550\/arXiv.1701.07875.","DOI":"10.48550\/arXiv.1701.07875"},{"key":"1166_CR14","doi-asserted-by":"crossref","unstructured":"Zhu, J. Y., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the 2017 IEEE international conference on computer vision (ICCV). pp. 2242\u20132251. IEEE","DOI":"10.1109\/ICCV.2017.244"},{"key":"1166_CR15","doi-asserted-by":"crossref","unstructured":"Bao, J. M., Chen, D., Wen, F., Li, H. Q., & Hua, G. (2017). CVAE-GAN: fine-grained image generation through asymmetric training. In: Proceedings of the 2017 IEEE international conference on computer vision (ICCV). pp. 2764\u20132773. IEEE.","DOI":"10.1109\/ICCV.2017.299"},{"key":"1166_CR16","doi-asserted-by":"publisher","first-page":"118232","DOI":"10.1016\/j.eswa.2022.118232","volume":"210","author":"DM Nguyen","year":"2022","unstructured":"Nguyen, D. M., Le, T. P., Vo, D. M., & Lee, S.-W. (2022). UnfairGAN: An enhanced generative adversarial network for raindrop removal from a single image. Expert Systems with Applications, 210, 118232. https:\/\/doi.org\/10.1016\/j.eswa.2022.118232","journal-title":"Expert Systems with Applications"},{"key":"1166_CR17","unstructured":"Wolterink, J. M., Leiner, T., & Isgum, I. (2018). Blood vessel geometry synthesis using generative adversarial networks."},{"key":"1166_CR18","doi-asserted-by":"publisher","first-page":"105878","DOI":"10.1016\/j.compbiomed.2022.105878","volume":"148","author":"J Gao","year":"2022","unstructured":"Gao, J., Zhao, W., Li, P., Huang, W., & Chen, Z. (2022). LEGAN: A light and effective generative adversarial network for medical image synthesis. Computers in Biology and Medicine, 148, 105878. https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105878","journal-title":"Computers in Biology and Medicine"},{"key":"1166_CR19","doi-asserted-by":"publisher","first-page":"102339","DOI":"10.1016\/j.media.2021.102339","volume":"77","author":"B Zhan","year":"2022","unstructured":"Zhan, B., Xiao, J., Cao, C., Peng, X., Zu, C., Zhou, J., & Wang, Y. (2022). Multi-constraint generative adversarial network for dose prediction in radiotherapy. Medical Image Analysis, 77, 102339. https:\/\/doi.org\/10.1016\/j.media.2021.102339","journal-title":"Medical Image Analysis"},{"issue":"7","key":"1166_CR20","doi-asserted-by":"publisher","first-page":"e005122","DOI":"10.1161\/CIRCOUTCOMES.118.005122","volume":"12","author":"BK Beaulieu-Jones","year":"2019","unstructured":"Beaulieu-Jones, B. K., Wu, Z. S., Williams, C., Lee, R., Bhavnani, S. P., Byrd, J. B., & Greene, C. S. (2019). Privacy-preserving generative deep neural networks support clinical data sharing. Circulation-Cardiovascular Quality And Outcomes, 12(7), e005122. https:\/\/doi.org\/10.1161\/CIRCOUTCOMES.118.005122","journal-title":"Circulation-Cardiovascular Quality And Outcomes"},{"key":"1166_CR21","doi-asserted-by":"publisher","first-page":"82913","DOI":"10.1109\/ACCESS.2019.2924492","volume":"7","author":"L Han","year":"2019","unstructured":"Han, L., Sheng, Y., & Zeng, X. (2019). A packet-length-adjustable attention model based on bytes embedding using flow-WGAN for smart cybersecurity. IEEE Access, 7, 82913\u201382926. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924492","journal-title":"IEEE Access"},{"key":"1166_CR22","doi-asserted-by":"publisher","first-page":"102177","DOI":"10.1016\/j.adhoc.2020.102177","volume":"105","author":"S Huang","year":"2020","unstructured":"Huang, S., & Lei, K. (2020). IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Networks, 105, 102177. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102177","journal-title":"Ad Hoc Networks"},{"key":"1166_CR23","doi-asserted-by":"crossref","unstructured":"Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., & Sridaran, R. (2018). Cloud security issues and challenges. In: Proceedings of the big data analytics. pp. 499\u2013514.","DOI":"10.1007\/978-981-10-6620-7_48"},{"issue":"6","key":"1166_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.6028\/NIST.SP.800-145","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Communications of the ACM, 53(6), 50\u201350. https:\/\/doi.org\/10.6028\/NIST.SP.800-145","journal-title":"Communications of the ACM"},{"issue":"2","key":"1166_CR25","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of cloud computing. Journal of Supercomputing, 63(2), 561\u2013592. https:\/\/doi.org\/10.1007\/s11227-012-0831-5","journal-title":"Journal of Supercomputing"},{"key":"1166_CR26","doi-asserted-by":"crossref","unstructured":"Kenan, W., & Shao, Q. (2012). Analysis of cloud computing and information security. In: Proceedings of the frontiers of manufacturing and design science II, PTS 1\u20136. pp. 3810\u20133813.","DOI":"10.4028\/www.scientific.net\/AMM.121-126.3810"},{"key":"1166_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhao, C., & Gao, T. (2015). Cloud computing: Security issues overview and solving techniques investigation. In: Proceedings of the intelligent cloud computing, pp. 152\u2013167.","DOI":"10.1007\/978-3-319-19848-4_10"},{"key":"1166_CR28","unstructured":"Li, Z. (2017). Analysis of information security risk and application security of cloud computing from the aspect of hierarchical protection. In: Proceedings of the proceedings of the 2017 2nd international conference on materials science, machinery and energy engineering (MSMEE 2017), pp. 1521\u20131526."},{"issue":"1","key":"1166_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/COMST.2021.3136132","volume":"24","author":"JX Liu","year":"2022","unstructured":"Liu, J. X., Nogueira, M., Fernandes, J., & Kantarci, B. (2022). Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems. IEEE Communications Surveys And Tutorials, 24(1), 123\u2013159. https:\/\/doi.org\/10.1109\/COMST.2021.3136132","journal-title":"IEEE Communications Surveys And Tutorials"},{"issue":"9","key":"1166_CR30","doi-asserted-by":"publisher","first-page":"5728","DOI":"10.1109\/TII.2022.3155656","volume":"18","author":"S De","year":"2022","unstructured":"De, S., Bermudez-Edo, M., Xu, H. H., & Cai, Z. P. (2022). Deep generative models in the industrial Internet of Things: A survey. IEEE Transactions On Industrial Informatics, 18(9), 5728\u20135737. https:\/\/doi.org\/10.1109\/TII.2022.3155656","journal-title":"IEEE Transactions On Industrial Informatics"},{"key":"1166_CR31","doi-asserted-by":"publisher","first-page":"161003","DOI":"10.1109\/ACCESS.2021.3131949","volume":"9","author":"M Sabuhi","year":"2021","unstructured":"Sabuhi, M., Zhou, M., Bezemer, C. P., & Musilek, P. (2021). Applications of generative adversarial networks in anomaly detection: A systematic literature review. IEEE Access, 9, 161003\u2013161029. https:\/\/doi.org\/10.1109\/ACCESS.2021.3131949","journal-title":"IEEE Access"},{"key":"1166_CR32","doi-asserted-by":"publisher","first-page":"102580","DOI":"10.1016\/j.cose.2021.102580","volume":"114","author":"FK Parast","year":"2022","unstructured":"Parast, F. K., Sindhav, C., Nikam, S., Yekta, H. I., Kent, K. B., & Hakak, S. (2022). Cloud computing security: A survey of service-based models. Computers & Security, 114, 102580. https:\/\/doi.org\/10.1016\/j.cose.2021.102580","journal-title":"Computers & Security"},{"issue":"5","key":"1166_CR33","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JPROC.2021.3052449","volume":"109","author":"L Ruff","year":"2021","unstructured":"Ruff, L., Kauffmann, J. R., Vandermeulen, R. A., Montavon, G., Samek, W., Kloft, M., Dietterich, T. G., & Muller, K. R. (2021). A unifying review of deep and shallow anomaly detection. Proceedings of the Ieee, 109(5), 756\u2013795. https:\/\/doi.org\/10.1109\/JPROC.2021.3052449","journal-title":"Proceedings of the Ieee"},{"key":"1166_CR34","doi-asserted-by":"publisher","first-page":"102655","DOI":"10.1016\/j.scs.2020.102655","volume":"66","author":"DL Chen","year":"2021","unstructured":"Chen, D. L., Wawrzynski, P., & Lv, Z. H. (2021). Cyber security in smart cities: A review of deep learning-based applications and case studies. Sustainable Cities and Society, 66, 102655. https:\/\/doi.org\/10.1016\/j.scs.2020.102655","journal-title":"Sustainable Cities and Society"},{"issue":"2","key":"1166_CR35","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1080\/02564602.2020.1854058","volume":"39","author":"A Arora","year":"2022","unstructured":"Arora, A., & Shantanu. (2022). A review on application of GANs in cybersecurity domain. IETE Technical Review, 39(2), 433\u2013441. https:\/\/doi.org\/10.1080\/02564602.2020.1854058","journal-title":"IETE Technical Review"},{"issue":"12","key":"1166_CR36","doi-asserted-by":"publisher","first-page":"4625","DOI":"10.3837\/tiis.2020.12.001","volume":"14","author":"JR Cheng","year":"2020","unstructured":"Cheng, J. R., Yang, Y., Tang, X. Y., Xiong, N. X., Zhang, Y., & Lei, F. F. (2020). Generative adversarial networks: A literature review. KSII Transactions on Internet and Information Systems, 14(12), 4625\u20134647. https:\/\/doi.org\/10.3837\/tiis.2020.12.001","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"1166_CR37","doi-asserted-by":"crossref","unstructured":"Dutta, I. K., Ghosh, B., Carlson, A., Totaro, M., & Bayoumi, M. (2020). Generative adversarial networks in security: A survey. In: Proceedings of the 2020 11th IEEE annual ubiquitous computing, electronics & mobile communication conference (UEMCON), pp. 399\u2013405.","DOI":"10.1109\/UEMCON51285.2020.9298135"},{"key":"1166_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8872923","volume":"2020","author":"YR Wu","year":"2020","unstructured":"Wu, Y. R., Wei, D. B., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020, 1\u201317. https:\/\/doi.org\/10.1155\/2020\/8872923","journal-title":"Security and Communication Networks"},{"issue":"3","key":"1166_CR39","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1007\/s10462-019-09717-4","volume":"53","author":"C Yinka-Banjo","year":"2020","unstructured":"Yinka-Banjo, C., & Ugot, O. A. (2020). A review of generative adversarial networks and its application in cybersecurity. Artificial Intelligence Review, 53(3), 1721\u20131736. https:\/\/doi.org\/10.1007\/s10462-019-09717-4","journal-title":"Artificial Intelligence Review"},{"key":"1166_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2021.3130903","volume":"35","author":"H Sun","year":"2021","unstructured":"Sun, H., Zhu, T., Zhang, Z., Jin, D., Xiong, P., & Zhou, W. (2021). Adversarial attacks against deep generative models on data: A survey. IEEE Transactions on Knowledge and Data Engineering, 35, 1\u20131. https:\/\/doi.org\/10.1109\/TKDE.2021.3130903","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1166_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jpdc.2022.05.007","volume":"168","author":"WW Lin","year":"2022","unstructured":"Lin, W. W., Yao, K., Zeng, L., Liu, F. G., Shan, C., & Hong, X. B. (2022). A GAN-based method for time-dependent cloud workload generation. Journal of Parallel and Distributed Computing, 168, 33\u201344. https:\/\/doi.org\/10.1016\/j.jpdc.2022.05.007","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1166_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-03994-z","author":"G Sravanthi","year":"2023","unstructured":"Sravanthi, G., & Moparthi, N. R. (2023). Dual interactive Wasserstein generative adversarial network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT. Cluster Computing. https:\/\/doi.org\/10.1007\/s10586-023-03994-z","journal-title":"Cluster Computing"},{"key":"1166_CR43","doi-asserted-by":"crossref","unstructured":"Labati, R.D., Piuri, V., & Scotti, F., (2011). All-IDB: The acute lymphoblastic leukemia image database for image processing. In: Proceedings of the 2011 18th IEEE international conference on image processing (ICIP). IEEE.","DOI":"10.1109\/ICIP.2011.6115881"},{"issue":"6","key":"1166_CR44","doi-asserted-by":"publisher","first-page":"2348","DOI":"10.3390\/s22062348","volume":"22","author":"ME Karar","year":"2022","unstructured":"Karar, M. E., Alotaibi, B., & Alotaibi, M. (2022). Intelligent medical IoT-enabled automated microscopic image diagnosis of acute blood cancers. Sensors, 22(6), 2348. https:\/\/doi.org\/10.3390\/s22062348","journal-title":"Sensors"},{"issue":"1","key":"1166_CR45","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/s13638-021-01898-3","volume":"2021","author":"WJ Liu","year":"2021","unstructured":"Liu, W. J., Zhang, Y., Deng, Z. L., Zhao, J. J., & Tong, L. (2021). A hybrid quantum-classical conditional generative adversarial network algorithm for human-centered paradigm in cloud. EURASIP Journal on Wireless Communications and Networking, 2021(1), 37. https:\/\/doi.org\/10.1186\/s13638-021-01898-3","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"10","key":"1166_CR46","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1109\/TMI.2014.2377694","volume":"34","author":"BH Menze","year":"2015","unstructured":"Menze, B. H., Jakab, A., Bauer, S., Kalpathy-Cramer, J., Farahani, K., Kirby, J., Burren, Y., Porz, N., Slotboom, J., Wiest, R., et al. (2015). The multimodal brain tumor image segmentation benchmark (BRATS). IEEE Transactions on Medical Imaging, 34(10), 1993\u20132024. https:\/\/doi.org\/10.1109\/TMI.2014.2377694","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"1166_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03730-x","author":"KL Neela","year":"2023","unstructured":"Neela, K. L., & Kavitha, V. (2023). Blockchain based chaotic deep GAN encryption scheme for securing medical images in a cloud environment. Applied Intelligence. https:\/\/doi.org\/10.1007\/s10489-022-03730-x","journal-title":"Applied Intelligence"},{"key":"1166_CR48","doi-asserted-by":"crossref","unstructured":"Leznik, M., Michalsky, P., Willis, P., Schanzel, B., Ostberg, P. O., & Domaschka, J. (2021). Multivariate time series synthesis using generative adversarial networks. In: Proceedings of the proceedings of the ACM\/SPEC international conference on performance engineering (ICPE '21), pp. 43\u201350. ACM.","DOI":"10.1145\/3427921.3450257"},{"key":"1166_CR49","doi-asserted-by":"crossref","unstructured":"Liu, Z. W., Luo, P., Wang, X. G., & Tang, X. O. (2015). Deep learning face attributes in the wild. In: Proceedings of the 2015 IEEE international conference ON computer vision (ICCV), pp 3730\u20133738. IEEE.","DOI":"10.1109\/ICCV.2015.425"},{"key":"1166_CR50","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TIFS.2022.3156818","volume":"17","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Mu, K., & Deng, R. H. (2022). Lightweight privacy-preserving GAN framework for model training and image synthesis. IEEE Transactions on Information Forensics and Security, 17, 1083\u20131098. https:\/\/doi.org\/10.1109\/TIFS.2022.3156818","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1166_CR51","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIFS.2020.2968188","volume":"15","author":"BW Tseng","year":"2020","unstructured":"Tseng, B. W., & Wu, P. Y. (2020). Compressive privacy generative adversarial network. IEEE Transactions on Information Forensics and Security, 15, 2499\u20132513. https:\/\/doi.org\/10.1109\/TIFS.2020.2968188","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1166_CR52","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.patrec.2020.09.010","volume":"138","author":"P Afshar","year":"2020","unstructured":"Afshar, P., Heidarian, S., Naderkhani, F., Oikonomou, A., Plataniotis, K. N., & Mohammadi, A. (2020). COVID-CAPS: A capsule network-based framework for identification of COVID-19 cases from X-ray images. Pattern Recognition Letters, 138, 638\u2013643. https:\/\/doi.org\/10.1016\/j.patrec.2020.09.010","journal-title":"Pattern Recognition Letters"},{"issue":"12","key":"1166_CR53","doi-asserted-by":"publisher","first-page":"10257","DOI":"10.1109\/JIOT.2021.3120998","volume":"9","author":"DC Nguyen","year":"2022","unstructured":"Nguyen, D. C., Ding, M., Pathirana, P. N., Seneviratne, A., & Zomaya, A. Y. (2022). Federated learning for COVID-19 detection with generative adversarial networks in edge cloud computing. IEEE Internet of Things Journal, 9(12), 10257\u201310271. https:\/\/doi.org\/10.1109\/JIOT.2021.3120998","journal-title":"IEEE Internet of Things Journal"},{"key":"1166_CR54","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the ICISSP: Proceedings of the 4th international conference on information systems security and privacy, pp. 108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"1166_CR55","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3163811","author":"L Vu","year":"2022","unstructured":"Vu, L., Nguyen, Q. U., Nguyen, N. D., Hoang, D. T., & Dutkiewicz, E. (2022). Deep generative learning models for cloud intrusion detection systems. IEEE Transactions on Cybernetics. https:\/\/doi.org\/10.1109\/TCYB.2022.3163811","journal-title":"IEEE Transactions on Cybernetics"},{"key":"1166_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03571-7","author":"G Senthilkumar","year":"2023","unstructured":"Senthilkumar, G., Tamilarasi, K., & Periasamy, J. K. (2023). Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization algorithm. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-023-03571-7","journal-title":"Wireless Networks"},{"key":"1166_CR57","unstructured":"Krizhevsky, A. (2009). Learning multiple layers of features from tiny images."},{"key":"1166_CR58","doi-asserted-by":"crossref","unstructured":"Kumar, R., Lal, S. P., & Sharma, A. (2016). Detecting denial of service attacks in the cloud. In: Proceedings of the 2016 IEEE 14th international conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, 2nd international conference on big data intelligence and computing and cyber science and technology congress(DASC\/PiCom\/DataCom\/CyberSciTech).","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.70"},{"key":"1166_CR59","doi-asserted-by":"publisher","first-page":"138834","DOI":"10.1109\/ACCESS.2021.3118971","volume":"9","author":"T Tazrin","year":"2021","unstructured":"Tazrin, T., Rahman, Q. A., Fouda, M. M., & Fadlullah, Z. M. (2021). LiHEA: migrating EEG analytics to ultra-edge IoT devices with logic-in-headbands. IEEE Access, 9, 138834\u2013138848. https:\/\/doi.org\/10.1109\/ACCESS.2021.3118971","journal-title":"IEEE Access"},{"key":"1166_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12880-6","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Wang, F. C., Liu, F., & Wang, X. H. (2022). Securing content-based image retrieval on the cloud using generative models. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-022-12880-6","journal-title":"Multimedia Tools and Applications"},{"key":"1166_CR61","doi-asserted-by":"publisher","first-page":"126853","DOI":"10.1016\/j.neucom.2023.126853","volume":"560","author":"HK Singh","year":"2023","unstructured":"Singh, H. K., Baranwal, N., Singh, K. N., Singh, A. K., & Zhou, H. (2023). GAN-based watermarking for encrypted images in healthcare scenarios. Neurocomputing, 560, 126853. https:\/\/doi.org\/10.1016\/j.neucom.2023.126853","journal-title":"Neurocomputing"},{"issue":"16","key":"1166_CR62","doi-asserted-by":"publisher","first-page":"10709","DOI":"10.1007\/s00500-021-05959-z","volume":"25","author":"N Rajkumar","year":"2021","unstructured":"Rajkumar, N., & Kannan, E. (2021). Deep learning-based key transmission (DLKT) protocol for secured group communication in cloud. Soft Computing, 25(16), 10709\u201310721. https:\/\/doi.org\/10.1007\/s00500-021-05959-z","journal-title":"Soft Computing"},{"key":"1166_CR63","doi-asserted-by":"crossref","unstructured":"Purswani, J., Rajagopal, R., Khandelwal, R., & Singh, A. (2020). Chaos theory on generative adversarial networks for encryption and decryption of data. In: Proceedings of the advances in bioinformatics, multimedia, and electronics circuits and signals, pp. 251\u2013260.","DOI":"10.1007\/978-981-15-0339-9_20"},{"issue":"7","key":"1166_CR64","doi-asserted-by":"publisher","first-page":"68","DOI":"10.16081\/j.epae.202205059","volume":"42","author":"Y Qun","year":"2022","unstructured":"Qun, Y., Zhiheng, S., Feifei, S., & Zhiyi, L. (2022). Differential privacy protection method of electrical load data towards cloud computing applications. Electric Power Automation Equipment, 42(7), 68\u201375. https:\/\/doi.org\/10.16081\/j.epae.202205059","journal-title":"Electric Power Automation Equipment"},{"issue":"4","key":"1166_CR65","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1109\/JIOT.2021.3097437","volume":"9","author":"Y Feng","year":"2022","unstructured":"Feng, Y., Liu, Z. J., Chen, J. L., Lv, H. X., Wang, J., & Yuan, J. S. (2022). Make the rocket intelligent at IoT edge: Stepwise GAN for anomaly detection of LRE with multisource fusion. IEEE Internet of Things Journal, 9(4), 3135\u20133149. https:\/\/doi.org\/10.1109\/JIOT.2021.3097437","journal-title":"IEEE Internet of Things Journal"},{"key":"1166_CR66","volume-title":"Short-term load forecasting of power IoT based on federated learning","author":"R Yuqi","year":"2021","unstructured":"Yuqi, R. (2021). Short-term load forecasting of power IoT based on federated learning. North China Electric Power University."},{"key":"1166_CR67","doi-asserted-by":"publisher","first-page":"107245","DOI":"10.1016\/j.nanoen.2022.107245","volume":"98","author":"Q Zheng","year":"2022","unstructured":"Zheng, Q., Hou, Y., Yang, H. L., Tan, P. C., Shi, H. Y., Xu, Z. J., Ye, Z. J., Chen, N., Qu, X. C., Han, X., et al. (2022). Towards a sustainable monitoring: A self-powered smart transportation infrastructure skin. Nano Energy, 98, 107245. https:\/\/doi.org\/10.1016\/j.nanoen.2022.107245","journal-title":"Nano Energy"},{"key":"1166_CR68","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03557-6","author":"J Perez","year":"2022","unstructured":"Perez, J., Arroba, P., & Moya, J. M. (2022). Data augmentation through multivariate scenario forecasting in data centers using generative adversarial networks. Applied Intelligence. https:\/\/doi.org\/10.1007\/s10489-022-03557-6","journal-title":"Applied Intelligence"},{"key":"1166_CR69","doi-asserted-by":"crossref","unstructured":"Yan, L. C., Liu, W. T., Liu, Y., & Hu, S. L. (2018). CGAN based cloud computing server power curve generating. In: Proceedings of the algorithms and architectures for parallel processing, ICA3PP 2018, PT IV, pp. 12\u201320.","DOI":"10.1007\/978-3-030-05063-4_2"},{"key":"1166_CR70","doi-asserted-by":"crossref","unstructured":"Gao, D., Wang, Y., Zhao, Z., Feng, B., & Li, Y. (2023). Prediction model of bursty network traffic for cloud data center based on GAN-TrellisNet. In: Proceedings of the 2023 IEEE 3rd international conference on information technology, big data and artificial intelligence (ICIBA), pp. 1697\u20131701.","DOI":"10.1109\/ICIBA56860.2023.10165218"},{"key":"1166_CR71","doi-asserted-by":"publisher","first-page":"103792","DOI":"10.1016\/j.compbiomed.2020.103792","volume":"121","author":"A To","year":"2020","unstructured":"To, A., Mt, B., Eay, C., Ubb, D., Oy, E., & Urafg, H. (2020). Automated detection of COVID-19 cases using deep neural networks with X-ray images. Computers in Biology and Medicine, 121, 103792. https:\/\/doi.org\/10.1016\/j.compbiomed.2020.103792","journal-title":"Computers in Biology and Medicine"},{"key":"1166_CR72","doi-asserted-by":"crossref","unstructured":"Seshadrinathan, K., Soundararajan, R., Bovik, A. C., & Cormack, L. K. (2010). A subjective study to evaluate video quality assessment algorithms. In: Proceedings of the human vision and electronic imaging XV.","DOI":"10.1117\/12.845382"},{"key":"1166_CR73","doi-asserted-by":"crossref","unstructured":"Frants, V., Voronin, V., Zelenskiy, A., & Agaian, S. (2018). Blind visual quality assessment for smart cloud-based video storage. In: Proceedings of the 2018 IEEE international conference on smart cloud (SMARTCLOUD), pp. 171\u2013174. IEEE","DOI":"10.1109\/SmartCloud.2018.00036"},{"issue":"3","key":"1166_CR74","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.3390\/app12031562","volume":"12","author":"J Bojato","year":"2022","unstructured":"Bojato, J., Donado, D., Jimeno, M., Moreno, G., & Villanueva-Polanco, R. (2022). Password guessability as a service (PGaaS). Applied Sciences-Basel, 12(3), 1562. https:\/\/doi.org\/10.3390\/app12031562","journal-title":"Applied Sciences-Basel"},{"issue":"23","key":"1166_CR75","doi-asserted-by":"publisher","first-page":"E215","DOI":"10.1161\/01.CIR.101.23.e215","volume":"101","author":"AL Goldberger","year":"2000","unstructured":"Goldberger, A. L., Amaral, L. A. N., Glass, L., Hausdorff, J. M., Ivanov, P. C., Mark, R. G., Mietus, J. E., Moody, G. B., Peng, C. K., & Stanley, H. E. (2000). PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals. Circulation, 101(23), E215. https:\/\/doi.org\/10.1161\/01.CIR.101.23.e215","journal-title":"Circulation"},{"issue":"24","key":"1166_CR76","doi-asserted-by":"publisher","first-page":"8934","DOI":"10.3390\/app10248934","volume":"10","author":"Y He","year":"2020","unstructured":"He, Y., Fu, B., Yu, J., Li, R. F., & Jiang, R. C. (2020). Efficient learning of healthcare data from IoT devices by edge convolution neural networks. Applied Sciences-Basel, 10(24), 8934. https:\/\/doi.org\/10.3390\/app10248934","journal-title":"Applied Sciences-Basel"},{"issue":"11","key":"1166_CR77","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278\u20132324. https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"1166_CR78","doi-asserted-by":"publisher","first-page":"475","DOI":"10.3978\/j.issn.2223-4292.2014.11.20","volume":"4","author":"S Jaeger","year":"2014","unstructured":"Jaeger, S., Candemir, S., Antani, S., W\u00e1ng, Y.-X.J., & Thoma, G. (2014). Two public chest X-ray datasets for computer-aided screening of pulmonary diseases. Quantitative Imaging in Medicine and Surgery, 4(6), 475\u2013477. https:\/\/doi.org\/10.3978\/j.issn.2223-4292.2014.11.20","journal-title":"Quantitative Imaging in Medicine and Surgery"},{"key":"1166_CR79","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE symposium on computational intelligence for security and defense applications, pp. 1\u20136.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1166_CR80","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4561","author":"K Devi","year":"2022","unstructured":"Devi, K., & Muthusenthil, B. (2022). Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN-RFOA. Transactions on Emerging Telecommunications Technologies. https:\/\/doi.org\/10.1002\/ett.4561","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"1166_CR81","doi-asserted-by":"crossref","unstructured":"Chkirbene, Z., Ben Abdallah, H., Hassine, K., Hamila, R., & Erbad, A. (2021). Data augmentation for intrusion detection and classification in cloud networks. In: Proceedings of the IWCMC 2021: 2021 17th international wireless communications & mobile computing conference (IWCMC), pp. 831\u2013836. IEEE","DOI":"10.1109\/IWCMC51323.2021.9498633"},{"key":"1166_CR82","volume-title":"Intrusion detection for cloud computing","author":"P Leilei","year":"2021","unstructured":"Leilei, P. (2021). Intrusion detection for cloud computing. Guilin University of Technology."},{"key":"1166_CR83","doi-asserted-by":"crossref","unstructured":"Jiang, W., Cheng, Y., Li, Y., & Zhao, M. (2023). Cloud environment intrusion detection based on GAN and LightGBM. In: Proceedings of the 2023 IEEE 3rd international conference on electronic technology, communication and information (ICETCI), pp. 1439\u20131443.","DOI":"10.1109\/ICETCI57876.2023.10177025"},{"key":"1166_CR84","doi-asserted-by":"crossref","unstructured":"Kanth, R. R., & Jacob, T. P. (2023). Enhanced capsule generative adversarial network with blockchain fostered intrusion detection system for enhancing cyber security in cloud. In: Proceedings of the 2023 2nd international conference on smart technologies and systems for next generation computing (ICSTSN), pp. 1\u20136.","DOI":"10.1109\/ICSTSN57873.2023.10151609"},{"key":"1166_CR85","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhao, Y. J., Niu, C. H., Liu, R., Sun, W., & Pei, D., Assoc Comp, M. (2019). Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the KDD'19: proceedings of the 25th ACM SIGKDD international conferencce on knowledge discovery and data mining, pp. 2828\u20132837.","DOI":"10.1145\/3292500.3330672"},{"key":"1166_CR86","doi-asserted-by":"crossref","unstructured":"Dinh, P. T., & Park, M. (2021). Economic denial of sustainability (EDoS ) detection using GANs in SDN-based cloud. In: Proceedings of the IEEE ICCE 2020: 2020 IEEE eighth international conference on communications and electronics (ICCE), pp. 135\u2013140. IEEE.","DOI":"10.1109\/ICCE48956.2021.9352082"},{"key":"1166_CR87","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., & Ng, A. (2011). Reading digits in natural images with unsupervised feature learning."},{"issue":"7","key":"1166_CR88","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.3390\/electronics12071638","volume":"12","author":"AK Budati","year":"2023","unstructured":"Budati, A. K., Vulapula, S. R., Shah, S. B., Al-Tirawi, A., & Carie, A. (2023). Secure multi-level privacy-protection scheme for securing private data over 5G-enabled hybrid cloud IoT networks. Electronics, 12(7), 1638. https:\/\/doi.org\/10.3390\/electronics12071638","journal-title":"Electronics"},{"key":"1166_CR89","doi-asserted-by":"crossref","unstructured":"Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 Network Data Set). In: Proceedings of the 2015 military communications and information systems conference (MILCIS). IEEE.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"1166_CR90","doi-asserted-by":"publisher","first-page":"121630","DOI":"10.1016\/j.eswa.2023.121630","volume":"238","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Bao, T., Qi, W., You, D., Liu, L., & Shen, L. (2024). Poisoning QoS-aware cloud API recommender system with generative adversarial network attack. Expert Systems with Applications, 238, 121630. https:\/\/doi.org\/10.1016\/j.eswa.2023.121630","journal-title":"Expert Systems with Applications"},{"key":"1166_CR91","unstructured":"KDD Cup 1999 Data. Available online: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html (accessed on August, 2022)."},{"key":"1166_CR92","doi-asserted-by":"crossref","unstructured":"Dong, H. Z., Qian, Y. S., Wang, L. L., & Lu, P. (2020). The application of image style transformation based on GAN in the intelligent mobile terminal. In: Proceedings of the 2020 5th international conference on computer and communication systems (ICCCS 2020). pp. 314\u2013318. IEEE.","DOI":"10.1109\/ICCCS49078.2020.9118603"},{"key":"1166_CR93","unstructured":"Mirza, M., & Osindero, S. (2014). Conditional generative adversarial nets. Computer Science, 2672\u20132680."},{"key":"1166_CR94","unstructured":"Odena, A., Olah, C., & Shlens, J. (2017). Conditional image synthesis with auxiliary classifier GANs. In: Proceedings of the international conference on machine learning, vol. 70."},{"key":"1166_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2020.3044312","volume":"60","author":"J Wang","year":"2022","unstructured":"Wang, J., Guo, S., Huang, R., Li, L., Zhang, X., & Jiao, L. (2022). Dual-channel capsule generation adversarial network for hyperspectral image classification. IEEE Transactions on Geoscience and Remote Sensing, 60, 1\u201316. https:\/\/doi.org\/10.1109\/TGRS.2020.3044312","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"1166_CR96","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., & Courville, A. (2017). Improved training of Wasserstein GANs. In: Proceedings of the advances in Neural information processing systems 30 (NIPS 2017)."},{"key":"1166_CR97","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Song, Y., & Qi, H. (2017). Age progression\/regression by conditional adversarial autoencoder. In: Proceedings of the 2017 IEEE conference on computer vision and pattern recognition (CVPR). 4352\u20134360.","DOI":"10.1109\/CVPR.2017.463"},{"key":"1166_CR98","doi-asserted-by":"crossref","unstructured":"Li, D., Chen, D., Jin, B., Shi, L., Goh, J., & Ng, S.-K. (2019). MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks. In: International conference on artificial neural networks, pp. 703\u2013716.","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"1166_CR99","unstructured":"Mogren, O. (2016). C-RNN-GAN: Continuous recurrent neural networks with adversarial training."},{"key":"1166_CR100","doi-asserted-by":"crossref","unstructured":"Zhang, X. Z., Qiao, M., Liu, L. K., Xu, Y. F., & Shi, W. S., Assoc Comp, M. (2019). Collaborative cloud-edge computation for personalized driving behavior modeling. In: Proceedings of the SEC'19: proceedings of the 4th ACM\/IEEE symposium on edge computing, pp. 209\u2013221.","DOI":"10.1145\/3318216.3363310"},{"key":"1166_CR101","doi-asserted-by":"publisher","first-page":"107646","DOI":"10.1016\/j.patcog.2020.107646","volume":"110","author":"W Li","year":"2021","unstructured":"Li, W., Fan, L., Wang, Z. Y., Ma, C., & Cui, X. H. (2021). Tackling mode collapse in multi-generator GANs with orthogonal vectors. Pattern Recognition, 110, 107646. https:\/\/doi.org\/10.1016\/j.patcog.2020.107646","journal-title":"Pattern Recognition"},{"key":"1166_CR102","first-page":"27","volume":"3","author":"M Bekkar","year":"2013","unstructured":"Bekkar, M., Djemaa, H. K., & Alitouche, T. A. (2013). Evaluation measures for models assessment over imbalanced data sets. Journal of Information Engineering and Applications, 3, 27\u201338.","journal-title":"Journal of Information Engineering and Applications"},{"issue":"5","key":"1166_CR103","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1016\/j.chaos.2007.10.049","volume":"40","author":"A Kanso","year":"2009","unstructured":"Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos Solitons & Fractals, 40(5), 2557\u20132568. https:\/\/doi.org\/10.1016\/j.chaos.2007.10.049","journal-title":"Chaos Solitons & Fractals"},{"issue":"5","key":"1166_CR104","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s12046-009-0040-y","volume":"34","author":"M Suneel","year":"2009","unstructured":"Suneel, M. (2009). Cryptographic pseudo-random sequences from the chaotic H\u00e9non map. Sadhana, 34(5), 689\u2013701. https:\/\/doi.org\/10.1007\/s12046-009-0040-y","journal-title":"Sadhana"},{"issue":"4","key":"1166_CR105","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1007\/s11227-018-2701-2","volume":"75","author":"SP Singh","year":"2019","unstructured":"Singh, S. P., Nayyar, A., Kumar, R., & Sharma, A. (2019). Fog computing: From architecture to edge computing and big data processing. Journal of Supercomputing, 75(4), 2070\u20132105. https:\/\/doi.org\/10.1007\/s11227-018-2701-2","journal-title":"Journal of Supercomputing"},{"key":"1166_CR106","doi-asserted-by":"publisher","first-page":"113361","DOI":"10.1016\/j.eswa.2020.113361","volume":"151","author":"CJ Zhou","year":"2020","unstructured":"Zhou, C. J., Li, A. L., Hou, A. H., Zhang, Z. W., Zhang, Z. X., Dai, P. F., & Wang, F. S. (2020). Modeling methodology for early warning of chronic heart failure based on real medical big data. Expert Systems with Applications, 151, 113361. https:\/\/doi.org\/10.1016\/j.eswa.2020.113361","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"1166_CR107","doi-asserted-by":"publisher","first-page":"4159","DOI":"10.1109\/TII.2020.3012157","volume":"17","author":"LY Qi","year":"2021","unstructured":"Qi, L. Y., Hu, C. H., Zhang, X. Y., Khosravi, M. R., Sharma, S., Pang, S. N., & Wang, T. (2021). Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment. IEEE Transactions on Industrial Informatics, 17(6), 4159\u20134167. https:\/\/doi.org\/10.1109\/TII.2020.3012157","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"1166_CR108","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TCSS.2020.3007812","volume":"8","author":"LN Wang","year":"2021","unstructured":"Wang, L. N., Zhang, X. Y., Wang, T., Wan, S. H., Srivastava, G., Pang, S. N., & Qi, L. Y. (2021). Diversified and scalable service recommendation with accuracy guarantee. IEEE Transactions on Computational Social Systems, 8(5), 1182\u20131193. https:\/\/doi.org\/10.1109\/TCSS.2020.3007812","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"1166_CR109","doi-asserted-by":"crossref","unstructured":"Yang, X., & Feng, D. (2019). Generative adversarial network based anomaly detection on the benchmark tennessee eastman process. In: Proceedings of the 2019 5th international conference on control, automation and robotics (ICCAR).","DOI":"10.1109\/ICCAR.2019.8813415"},{"key":"1166_CR110","unstructured":"Shi, J., Gu, C., Sun, H., Shen, J., & Li, Z. (2019). Data expansion for foreign object detection in power grid. In: Proceedings of the 2019 IEEE PES Asia-Pacific power and energy engineering conference (APPEEC)."},{"key":"1166_CR111","doi-asserted-by":"crossref","unstructured":"Tuluptceva, N., Bakker, B., Fedulova, I., & Konushin, A. (2020). Perceptual image anomaly detection. In: Pattern recognition.","DOI":"10.1007\/978-3-030-41404-7_12"},{"key":"1166_CR112","unstructured":"Guan, S., Loew, M., & Ko, H. (2020). Data separability for neural network classifiers and the development of a separability index. arXiv e-prints."},{"key":"1166_CR113","unstructured":"Mo, S., Cho, M., & Shin, J. (2020). Freeze the discriminator: A simple baseline for fine-tuning GANs."},{"key":"1166_CR114","unstructured":"Robb, E., Chu, W. S., Kumar, A., & Huang, J. B. (2021). Few-shot adaptation of generative adversarial networks."},{"key":"1166_CR115","unstructured":"Zhang, R., Che, T., Ghahramani, Z., Bengio, Y., & Song, Y. (2018). MetaGAN: An adversarial approach to few-shot learning. In: Proceedings of the neural information processing systems."},{"key":"1166_CR116","unstructured":"Nguyen, K., & Todorovic, S. (2020). A self-supervised GAN for unsupervised few-shot object recognition. In: Proceedings of the international conference on pattern recognition."},{"key":"1166_CR117","unstructured":"Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J., & Aila, T. (2020). Training generative adversarial networks with limited data."},{"key":"1166_CR118","doi-asserted-by":"crossref","unstructured":"Kaneko, T., & Harada, T. (2019). Noise Robust generative adversarial networks.","DOI":"10.1109\/CVPR.2019.00257"},{"key":"1166_CR119","doi-asserted-by":"crossref","unstructured":"Kaneko, T., & Harada, T. (2020). Noise robust generative adversarial networks. In: Proceedings of the 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR42600.2020.00843"},{"key":"1166_CR120","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.compeleceng.2016.03.004","volume":"59","author":"L Coppolino","year":"2017","unstructured":"Coppolino, L., D\u2019Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging threats and current solutions. Computers & Electrical Engineering, 59, 126\u2013140. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.03.004","journal-title":"Computers & Electrical Engineering"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01166-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-024-01166-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01166-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T10:09:12Z","timestamp":1720260552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-024-01166-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":120,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1166"],"URL":"https:\/\/doi.org\/10.1007\/s11235-024-01166-x","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"29 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}