{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:32:57Z","timestamp":1775367177492,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Institute of Information and Communications Technology Planning and Evaluation"},{"DOI":"10.13039\/501100003621","name":"Korea Government","doi-asserted-by":"publisher","award":["2020-0\u201300952"],"award-info":[{"award-number":["2020-0\u201300952"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,2,1]]},"DOI":"10.1109\/jiot.2022.3211346","type":"journal-article","created":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T16:31:44Z","timestamp":1664814704000},"page":"2330-2345","source":"Crossref","is-referenced-by-count":260,"title":["An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-9951","authenticated-orcid":false,"given":"Cheolhee","family":"Park","sequence":"first","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0071-0948","authenticated-orcid":false,"given":"Jonghoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"given":"Youngsoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4973-7700","authenticated-orcid":false,"given":"Jong-Geun","family":"Park","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"given":"Hyunjin","family":"Kim","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9690-5055","authenticated-orcid":false,"given":"Dowon","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Kongju National University, Gongju, South Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"C4.5: Programs for Machine Learning","author":"Quinlan","year":"1993"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref3","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref4","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. 27th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Goodfellow"},{"key":"ref5","article-title":"BEGAN: Boundary equilibrium generative adversarial networks","author":"Berthelot","year":"2017","journal-title":"arXiv:1703.10717"},{"key":"ref6","volume-title":"KDD cup 1999 data","author":"Hettich","year":"1999"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref9","article-title":"A labeled dataset with malicious and benign IoT network traffic","author":"Parmisano","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868171"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1089\/big.2018.0023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2020.9020003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3157730"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.145"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3139363"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3009180"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2858277"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70087-8_58"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IRI49571.2020.00012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-162"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34914-1_29"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05993-w"},{"key":"ref35","article-title":"Anomaly detection with generative adversarial networks for multivariate time series","author":"Li","year":"2018","journal-title":"arXiv:1809.04758"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GloSIC50886.2020.9267878"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078381"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.21236\/ada164453"},{"key":"ref39","first-page":"3","article-title":"Autoencoders, minimum description length and helmholtz free energy","volume-title":"Proc. 6th Int. Conf. Neural Inf. Process. Syst.","author":"Hinton"},{"key":"ref40","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2016","journal-title":"arXiv:1511.06434"},{"key":"ref41","article-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014","journal-title":"arXiv:1411.1784"},{"key":"ref42","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn. (ICML)","author":"Arjovsky"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953095"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10024910\/09908159.pdf?arnumber=9908159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:01:25Z","timestamp":1769493685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9908159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3211346","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,1]]}}}