{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:04:24Z","timestamp":1774631064283,"version":"3.50.1"},"reference-count":147,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003524","name":"Ministry of Business, Innovation, and Employment (MBIE) from the New Zealand Government","doi-asserted-by":"publisher","award":["MAUX1912"],"award-info":[{"award-number":["MAUX1912"]}],"id":[{"id":"10.13039\/501100003524","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3296707","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T20:58:52Z","timestamp":1689800332000},"page":"76071-76094","source":"Crossref","is-referenced-by-count":104,"title":["A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7113-380X","authenticated-orcid":false,"given":"Aeryn","family":"Dunmore","sequence":"first","affiliation":[{"name":"Department of Computer Science, Cybersecurity Laboratory, Massey University, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1002-057X","authenticated-orcid":false,"given":"Julian","family":"Jang-Jaccard","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Cybersecurity Laboratory, Massey University, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8455-2499","authenticated-orcid":false,"given":"Fariza","family":"Sabrina","sequence":"additional","affiliation":[{"name":"School of Engineering and Technology, Central Queensland University, Sydney, NSW, Australia"}]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Ajou University, Suwon, South Korea"}]}],"member":"263","reference":[{"key":"ref57","article-title":"Combating mode collapse in GAN training: An empirical analysis using Hessian eigenvalues","author":"durall","year":"2020","journal-title":"arXiv 2012 09673"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref59","article-title":"Continual learning in generative adversarial nets","author":"seff","year":"2017","journal-title":"arXiv 1705 08395"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207181"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2017.8324257"},{"key":"ref52","article-title":"Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks","author":"creech","year":"2014"},{"key":"ref55","article-title":"UNSW-NB15 computer security dataset: Analysis through visualization","author":"zoghi","year":"2021","journal-title":"arXiv 2101 05067"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297344"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101787"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5826-5_50"},{"key":"ref48","article-title":"PassGAN: A deep learning approach for password guessing","author":"hitaj","year":"2017","journal-title":"arXiv 1709 00440"},{"key":"ref47","author":"mutalik","year":"2010","journal-title":"RockYou"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0074-7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108222"},{"key":"ref44","article-title":"DGArchive A deep dive into domain generating malware","author":"plohmann","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3136874"},{"key":"ref49","article-title":"Generative deep learning techniques for password generation","author":"biesner","year":"2020","journal-title":"arXiv 2012 05685"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref7","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"arXiv 1411 1784"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.1988.113412"},{"key":"ref4","article-title":"&#x2018;I&#x2019;m not a robot&#x2019;: Google&#x2019;s anti-robot reCAPTCHA trains their robots to see","author":"daly","year":"2017"},{"key":"ref3","article-title":"Are you unwittingly helping to train Google&#x2019;s AI models? How Google is using your reCAPTCHA entries to train machine learning models","author":"maruzani","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510583"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2020.100004"},{"key":"ref100","article-title":"Adversarially learned inference","author":"dumoulin","year":"2016","journal-title":"arXiv 1606 00704"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CSET.2019.8904890"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258167"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","article-title":"CICIDS-2017 dataset feature analysis with information gain for anomaly detection","volume":"8","author":"stiawan","year":"2020","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.029858"},{"key":"ref37","year":"1999","journal-title":"DARPA Intrusion Detection Evaluation"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA49915.2021.9385742"},{"key":"ref31","year":"1999","journal-title":"KDD Cup 1999 data"},{"key":"ref30","article-title":"Mode regularized generative adversarial networks","author":"che","year":"2017","journal-title":"arXiv 1612 02136"},{"key":"ref33","year":"2009","journal-title":"NSL-KDD Dataset"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.11.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12030"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463573"},{"key":"ref38","article-title":"DARPA dataset | papers with code","author":"robert","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS50296.2020.9462227"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919758"},{"key":"ref26","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"arXiv 1606 03498"},{"key":"ref25","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619455"},{"key":"ref22","article-title":"Better accuracy with quantified privacy: Representations learned via reconstructive adversarial network","author":"liu","year":"2019","journal-title":"arXiv 1901 08730"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref27","article-title":"Generative adversarial networks (GANs): An overview of theoretical model, evaluation metrics, and recent developments","author":"salehi","year":"2020","journal-title":"arXiv 2005 13178"},{"key":"ref29","article-title":"Pros and cons of GAN evaluation measures","author":"borji","year":"2018","journal-title":"arXiv 1802 03446"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2020.1854058"},{"key":"ref12","first-page":"1","article-title":"Intrusion detection systems: A state-of-the-art taxonomy and survey","author":"alkasassbeh","year":"2022","journal-title":"Arabian J Sci Eng"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4073"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298135"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107506"},{"key":"ref126","first-page":"39","article-title":"0-Days & mitigations: Roadways to exploit and secure connected BMW cars","volume":"2019","author":"cai","year":"2019","journal-title":"Black Hat USA"},{"key":"ref96","article-title":"Microsoft malware classification challenge (BIG 2015)","author":"ronen","year":"2018","journal-title":"arXiv 1802 10135"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10037-9"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322377"},{"key":"ref124","author":"shepardson","year":"2015","journal-title":"Fiat chrysler will recall vehicles over hacking worries"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"ref98","article-title":"Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior","author":"bhaskara","year":"2018","journal-title":"arXiv 1807 07525"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref17","article-title":"Improved detection of adversarial images using deep neural networks","author":"gao","year":"2020","journal-title":"arXiv 2007 05573"},{"key":"ref16","article-title":"Adversarial transformation networks: Learning to generate adversarial examples","author":"baluja","year":"2017","journal-title":"arXiv 1703 09387"},{"key":"ref19","article-title":"Generating natural adversarial examples","author":"zhao","year":"2017","journal-title":"arXiv 1710 11342"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ITME53901.2021.00041"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8940025"},{"key":"ref134","article-title":"StarGAN: Unified generative adversarial networks for multi-domain image-to-image translation","author":"choi","year":"2017","journal-title":"arXiv 1711 09020"},{"key":"ref95","article-title":"VirusShare&#x2013;because sharing is caring","author":"forensics","year":"0"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62223-7_2"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412832"},{"key":"ref132","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017","journal-title":"arXiv 1702 05983"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3103139"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI52376.2021.9515086"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922692"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297264"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761301"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2970919"},{"key":"ref85","article-title":"SeqGAN: Sequence generative adversarial nets with policy gradient","author":"yu","year":"2016","journal-title":"arXiv 1609 05473"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3675"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/computers11060085"},{"key":"ref135","article-title":"StackGAN: Text to photo-realistic image synthesis with stacked generative adversarial networks","author":"zhang","year":"2016","journal-title":"arXiv 1612 03242"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2008.231"},{"key":"ref136","article-title":"Navigating the GAN parameter space for semantic image editing","author":"cherepkov","year":"2020","journal-title":"arXiv 2011 13786"},{"key":"ref82","article-title":"Self-attention generative adversarial networks","author":"zhang","year":"2018","journal-title":"arXiv 1805 08318"},{"key":"ref144","author":"song","year":"2006","journal-title":"Description of Kyoto University Benchmark Data"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00782"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2018.00066"},{"key":"ref84","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","author":"chen","year":"2016","journal-title":"arXiv 1606 03657"},{"key":"ref142","author":"mueller","year":"2023","journal-title":"Cyber operations during the Russo&#x2013;Ukrainian war"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12476"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2018.1440260"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107505"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00018"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330866"},{"key":"ref79","article-title":"BEGAN: Boundary equilibrium generative adversarial networks","author":"berthelot","year":"2017","journal-title":"arXiv 1703 10717"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.118"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108077"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.3390\/app9204221"},{"key":"ref75","article-title":"Auxiliary-classifier GAN for malware analysis","author":"nagaraju","year":"2021","journal-title":"arXiv 2107 01620"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01332-y"},{"key":"ref74","article-title":"Conditional image synthesis with auxiliary classifier GANs","author":"odena","year":"2016","journal-title":"arXiv 1610 09585"},{"key":"ref105","first-page":"975","article-title":"FLOWGAN: Unbalanced network encrypted traffic identification method based on GAN","author":"wang","year":"2019","journal-title":"Proc IEEE Int Conf Parallel Distrib Process With Appl Big Data Cloud Comput Sustain Comput Commun Social Comput Netw (ISPA\/BDCloud\/SocialCom\/SustainCom)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.08.001"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00925-6"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/FIT53504.2021.00047"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3211346"},{"key":"ref2","article-title":"Auto-encoding variational Bayes","author":"kingma","year":"2013","journal-title":"arXiv 1312 6114"},{"key":"ref1","first-page":"1","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798161"},{"key":"ref111","author":"garcia","year":"2020","journal-title":"IoT-23 A labeled dataset with malicious and benign IoT network traffic"},{"key":"ref70","article-title":"GANG-MAM: GAN based enGine for modifying Android malware","volume":"18","author":"renjith","year":"2022","journal-title":"SoftwareX"},{"key":"ref112","first-page":"1093","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Secur Symp ( USENIX Secur )"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350937"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.12792\/icisip2019.046"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140015"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-021-04273-7"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2019.8781458"},{"key":"ref67","first-page":"1","article-title":"Adversarial feature learning","author":"donahue","year":"2017","journal-title":"Proc 5th Int Conf Learn Represent"},{"key":"ref117","article-title":"Deep learning in mobile and wireless networking: A survey","author":"zhang","year":"2018","journal-title":"arXiv 1803 04311"},{"key":"ref69","article-title":"Training a bidirectional GAN-based one-class classifier for network intrusion detection","author":"xu","year":"2022","journal-title":"arXiv 2202 01332"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143393"},{"key":"ref64","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.184"},{"key":"ref63","article-title":"Inceptionism: Going deeper into neural networks","author":"mordvintsev","year":"2015"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2018.8650372"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1040037"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348244"},{"key":"ref65","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref114","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","author":"koroniotis","year":"2018","journal-title":"arXiv 1811 00701"},{"key":"ref60","first-page":"2","article-title":"Conditional generative adversarial nets for convolutional face generation","volume":"2014","author":"gauthier","year":"2014","journal-title":"Class Project for Stanford CS231N Convolutional Neural Networks for Visual Recognition Winter semester"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref123","author":"greenberg","year":"2015","journal-title":"Hackers remotely kill a jeep on the highway&#x2014;with me in it"},{"key":"ref62","article-title":"Striving for simplicity: The all convolutional net","author":"springenberg","year":"2014","journal-title":"arXiv 1412 6806"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/s20185305"},{"key":"ref61","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2015","journal-title":"arXiv 1511 06434"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1080\/08850607.2013.780552"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10187144.pdf?arnumber=10187144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T18:09:27Z","timestamp":1692036567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10187144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":147,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3296707","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}