{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:35:45Z","timestamp":1773999345481,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/globecom59602.2025.11432172","type":"proceedings-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:01Z","timestamp":1773950641000},"page":"1065-1070","source":"Crossref","is-referenced-by-count":0,"title":["AE-Multi-WGAN: A Robust Multi-Attack Detection IDS for Imbalanced Datasets"],"prefix":"10.1109","author":[{"given":"Ishfaq Bashir","family":"Sofi","sequence":"first","affiliation":[{"name":"Concordia University,Department of Electrical and Computer Engineering,Montreal,QC,Canada"}]},{"given":"Anjali","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Concordia University,Department of Electrical and Computer Engineering,Montreal,QC,Canada"}]},{"given":"Kuljeet","family":"Kaur","sequence":"additional","affiliation":[{"name":"&#x00C9;cole de Technologie Sup&#x00E9;rieure,Department of Electrical Engineering,Montreal,QC,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11091502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00682-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112455"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app15031552"},{"issue":"1","key":"ref7","first-page":"88243","article-title":"FA-CNN and autoencoder-based ensemble model for packet flow classification in IDS","volume":"15","author":"Selvakumar","year":"2025","journal-title":"Scientific Reports"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10279032"},{"key":"ref9","article-title":"An LSTM-based network intrusion detection system using focal loss and SMOTE for class imbalance","author":"Nawaz","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i3.pp3315-3322"},{"key":"ref11","article-title":"S2CGAN-IDS: Lightweight GAN for class-imbalanced intrusion detection in IoT networks","author":"Wang","year":"2023"},{"issue":"1","key":"ref12","article-title":"Statistical feature selection for lightweight network intrusion detection","volume":"15","author":"Kaushik","year":"2025","journal-title":"Scientific Reports"},{"key":"ref13","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015"},{"key":"ref14","article-title":"Wasserstein GAN","author":"Arjovsky","year":"2017"},{"key":"ref15","article-title":"AE-WGAN: Autoencoder integrated with WGAN for improved IDS data synthesis","volume-title":"IEEE International Conference on Communications (ICC)","author":"Zhao"},{"key":"ref16","article-title":"Multi-GAN IDS: ensemble GANs for intrusion detection","volume-title":"International Conference on Smart Digital Environment (ICSDE)","author":"Abouelmehdi"},{"key":"ref17","article-title":"Spectral normalization for GANs","author":"Miyato","year":"2018"},{"key":"ref18","article-title":"MAGENTO: A multi-objective GAN-based framework for network anomaly detection","volume-title":"IEEE Global Communications Conference (GLOBECOM)","author":"He"},{"key":"ref19","first-page":"102607","article-title":"TACGAN-IDS: Temporal-aware conditional GAN for intrusion detection","volume":"115","author":"Liu","year":"2023","journal-title":"Computers & Security"},{"key":"ref20","first-page":"110452","article-title":"TMG-IDS: Transformer-based multi-generator GAN for IDS","volume":"11","author":"Lee","year":"2023","journal-title":"IEEE Access"},{"key":"ref21","article-title":"Master the art of feature engineering and feature selection","author":"Chen","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.15849\/IJASCA.220720.13"}],"event":{"name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","location":"Taipei, Taiwan","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["GLOBECOM 2025 - 2025 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431620\/11431622\/11432172.pdf?arnumber=11432172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T06:03:17Z","timestamp":1773986597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/globecom59602.2025.11432172","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}