{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:15:55Z","timestamp":1765041355587,"version":"3.37.3"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["GUP-2020-062,UKM-TR-022"],"award-info":[{"award-number":["GUP-2020-062,UKM-TR-022"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996040","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Ali","family":"Lamjid","sequence":"first","affiliation":[{"name":"Center for Cybersecurity, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology"}]},{"given":"Khairul Akram Zainol","family":"Ariffin","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology"}]},{"given":"Mohd Juzaiddin AB","family":"Aziz","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence and Technology, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology"}]},{"given":"Nor Samsiah","family":"Sani","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence and Technology, Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"2672","article-title":"Generative Adversarial Nets","volume-title":"Advances in Neural Information Processing Systems","volume":"27","author":"Goodfellow","year":"2014"},{"key":"ref2","first-page":"2234","article-title":"Improved Techniques for Training GANS","volume-title":"Advances in Neural Information Processing Systems","volume":"29","author":"Salimans","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2905015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/s0962492900002919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01431160802549278"},{"volume-title":"Deep Learning","year":"2016","author":"Goodfellow","key":"ref6"},{"issue":"11","key":"ref7","first-page":"455","article-title":"Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network","volume":"3","author":"Panchal","year":"2014","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"ref9","first-page":"2642","article-title":"Conditional Image Synthesis with Auxiliary Classifier GANS","volume-title":"Proceedings of the 34th International Conference on Machine Learning","author":"Odena"},{"key":"ref10","first-page":"1","article-title":"Efficient GAN-Based Anomaly Detection","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR 2018)","author":"Zenati"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSET.2019.8904890"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app9204221"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0255312"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.015413"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0110477"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17576\/jsm-2020-4902-24"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1529\/4\/042082"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0110751"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0111120"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0111169"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9327215"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2895334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101666"},{"volume-title":"UCI KDD Archive: KDD Cup 1999 Data","year":"1999","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779523"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2017-0601-05"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI46879.2019.9042128"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020259"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s21124223"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2905633"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996040.pdf?arnumber=9996040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:25:23Z","timestamp":1709378723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996040","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}