{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T12:08:08Z","timestamp":1775909288236,"version":"3.50.1"},"reference-count":146,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Department of Software Science, Tallinn University of Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3573194","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T17:07:04Z","timestamp":1748020024000},"page":"4689-4717","source":"Crossref","is-referenced-by-count":8,"title":["Generative AI in Intrusion Detection Systems for Internet of Things: A Systematic Literature Review"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0990-6031","authenticated-orcid":false,"given":"Zhe","family":"Deng","sequence":"first","affiliation":[{"name":"Department of Software Science, Tallinn University of Technology, Tallinn, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1436-1328","authenticated-orcid":false,"given":"Ants","family":"Torim","sequence":"additional","affiliation":[{"name":"Department of Software Science, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Sadok","family":"Ben Yahia","sequence":"additional","affiliation":[{"name":"Department of Software Science, Tallinn University of Technology, Tallinn, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8882-4095","authenticated-orcid":false,"given":"Hayretdin","family":"Bahsi","sequence":"additional","affiliation":[{"name":"Department of Software Science, Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","doi-asserted-by":"crossref","first-page":"683","DOI":"10.3390\/brainsci13040683","article-title":"Analysis of IoT security challenges and its solutions using artificial intelligence","volume":"13","author":"Mazhar","year":"2023","journal-title":"Brain Sci."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/j.array.2023.100306","article-title":"Ensuring network security with a robust intrusion detection system using ensemble-based machine learning","volume":"19","author":"Hossain","year":"2023","journal-title":"Array"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/365153.365168"},{"key":"ref5","first-page":"123","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Goodfellow"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Zarpel\u00e3o","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"ref7","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","article-title":"Network intrusion detection for IoT security based on learning techniques","volume":"21","author":"Chaabouni","year":"2019","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","article-title":"Internet of Things: A survey on machine learning-based intrusion detection approaches","volume":"151","author":"da Costa","year":"2019","journal-title":"Comput. Netw."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407048"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04557-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02014-x"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105124","article-title":"Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues","volume":"189","author":"Aldweesh","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref13","article-title":"Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study","volume":"50","author":"Ferrag","year":"2020","journal-title":"J. Inf. Security Appl."},{"issue":"4","key":"ref14","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1016\/j.dcan.2020.12.002","article-title":"Deep learning for the Internet of Things: Potential benefits and use-cases","volume":"7","author":"Saleem","year":"2021","journal-title":"Digit. Commun. Netw."},{"key":"ref15","first-page":"111","article-title":"Cyber attacks detection based on generative adversarial networks","volume-title":"Proc. 2nd Asia Conf. Comput. Commun. (ACCC)","author":"Shi"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108149","article-title":"Generative adversarial networks (GANs) in networking: A comprehensive survey & evaluation","volume":"194","author":"Navidan","year":"2021","journal-title":"Comput. Netw."},{"key":"ref17","article-title":"Adversarial machine learning in IoT from an insider point of view","volume":"70","author":"Aloraini","year":"2022","journal-title":"J. Inf. Security Appl."},{"issue":"9","key":"ref18","doi-asserted-by":"crossref","first-page":"5728","DOI":"10.1109\/TII.2022.3155656","article-title":"Deep generative models in the Industrial Internet of Things: A survey","volume":"18","author":"De","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref19","volume-title":"Procedures for Performing Systematic Reviews","author":"Kitchenham","year":"2004"},{"key":"ref20","first-page":"2","article-title":"Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems","volume-title":"Proc. Int. Russian Autom. Conf. (RusAutoCon)","author":"Belenko"},{"key":"ref21","first-page":"23","article-title":"Generative adversarial networks for distributed intrusion detection in the Internet of Things","volume-title":"Proc. IEEE Global Commun. Conf. (GLOBECOM)","author":"Ferdowsi"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref23","first-page":"1109","article-title":"A blockchain data balance using a generative adversarial network approach: Application to smart house IDS","volume-title":"Proc. 4th Int. Conf. Adv. Aspects Softw. Eng. (ICAASE)","author":"Bouzeraib"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101851","article-title":"Building auto-encoder intrusion detection system based on random forest feature selection","volume":"95","author":"Li","year":"2020","journal-title":"Comput. Security"},{"key":"ref25","first-page":"99","volume-title":"Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery","volume":"12081","author":"Salman","year":"2020"},{"key":"ref26","first-page":"376","article-title":"G-IDS: Generative adversarial networks assisted intrusion detection system","volume-title":"Proc. IEEE 44th Annu. Comput. Softw. Appl. Conf. (COMPSAC)","author":"Shahriar"},{"key":"ref27","first-page":"1","article-title":"Generative adversarial network and auto encoder based anomaly detection in distributed IoT networks","volume-title":"Proc. IEEE Global Commun. Conf. (GLOBECOM)","author":"Zixu"},{"key":"ref28","first-page":"70","article-title":"Generative deep learning for Internet of Things network traffic generation","volume-title":"Proc. IEEE Pac. Rim Int. Symp. Depend. Comput. (PRDC)","author":"Shahid"},{"key":"ref29","first-page":"1516","article-title":"Internet of Things intrusion detection: A deep learning approach","volume-title":"Proc. IEEE Symp. Comput. Intell. (SSCI)","author":"Dawoud"},{"key":"ref30","first-page":"1","article-title":"Intrusion detection for smart home security based on data augmentation with edge computing","volume-title":"Proc. IEEE Int. Conf. Commun.","author":"Yuan"},{"key":"ref31","first-page":"12","article-title":"A comprehensive data sampling analysis applied to the classification of rare IoT network intrusion types","volume-title":"Proc. IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC)","author":"Sapre"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","article-title":"A framework for anomaly detection in IoT networks using conditional generative adversarial networks","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"issue":"8","key":"ref33","doi-asserted-by":"crossref","first-page":"991","DOI":"10.3103\/S0146411621080241","article-title":"Application of synthetic data generation methods to the detection of network attacks on Internet of Things devices","volume":"55","author":"Ovasapyan","year":"2021","journal-title":"Autom. Control Comput. Sci."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.future.2021.05.030","article-title":"Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things","volume":"124","author":"Hao","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","article-title":"AttackGAN: Adversarial attack against black-box IDS using generative adversarial networks","volume":"187","author":"Zhao","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2021.102661","article-title":"Deep learning-based reliable routing attack detection mechanism for Industrial Internet of Things","volume":"123","author":"Nayak","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref37","first-page":"1","article-title":"Def-IDS: An ensemble defense mechanism against adversarial attacks for deep learning-based network intrusion detection","volume-title":"Proc. Int. Conf. Comput. Commun. Netw. (ICCCN)","author":"Wang"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05993-w"},{"key":"ref39","first-page":"1","article-title":"Federated intrusion detection in NG-IoT healthcare systems: An adversarial approach","volume-title":"Proc. IEEE Int. Conf. Commun.","author":"Siniosoglou"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45778-5_8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3477026"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024800"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467827"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3466826.3466843"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034621"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.comcom.2021.08.005","article-title":"Unbalanced abnormal traffic detection based on improved res-BIGRU and integrated dynamic ELM optimization","volume":"179","author":"Ma","year":"2021","journal-title":"Comput. Commun."},{"issue":"6","key":"ref47","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1007\/s11036-022-02075-6","article-title":"A GAN-based intrusion detection model for 5G enabled future metaverse","volume":"27","author":"Ding","year":"2022","journal-title":"Mobile Netw. Appl."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","article-title":"A lightweight supervised intrusion detection mechanism for IoT networks","volume":"127","author":"Roy","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref49","first-page":"2788","article-title":"Adversarial attacks against IoT networks using conditional GAN based learning","volume-title":"Proc. IEEE Global Commun. Conf. (GLOBECOM)","author":"Benaddi"},{"issue":"2","key":"ref50","first-page":"1140","article-title":"An unsupervised generative adversarial network based-host intrusion detection system for Internet of Things devices","volume":"25","author":"Idrissi","year":"2022","journal-title":"Ind. J. Elect. Eng. Comput. Sci."},{"issue":"21","key":"ref51","doi-asserted-by":"crossref","first-page":"8085","DOI":"10.3390\/s22218085","article-title":"Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks","volume":"22","author":"Benaddi","year":"2022","journal-title":"Sensors"},{"issue":"11","key":"ref52","article-title":"Block chain fostered cycle-consistent generative adversarial network framework espoused intrusion detection for protecting IoT network","volume":"33","author":"Sugitha","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"3","key":"ref53","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dcan.2022.02.007","article-title":"Enhancing IoT anomaly detection performance for federated learning","volume":"8","author":"Weinger","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"ref54","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.comcom.2022.06.015","article-title":"FEDGAN-IDS: Privacy-preserving IDS using GAN and federated learning","volume":"192","author":"Tabassum","year":"2022","journal-title":"Comput. Commun."},{"key":"ref55","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102856","article-title":"Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization","volume":"121","author":"Li","year":"2022","journal-title":"Comput. Security"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.future.2022.02.019","article-title":"FGMD: A robust detector against adversarial attacks in the IoT network","volume":"132","author":"Jiang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"ref57","first-page":"456","article-title":"GAAINet: A generative adversarial artificial immune network model for intrusion detection in industrial IoT systems","volume":"13","author":"Sithungu","year":"2022","journal-title":"J. Adv. Inf. Technol."},{"key":"ref58","first-page":"1","article-title":"GANIBOT: A network flow based semi supervised generative adversarial networks model for IoT Botnets detection","volume-title":"Proc. IEEE Int. Conf. Omni-Layer Intell. Syst. (COINS)","author":"Saurabh"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117936","article-title":"Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems","volume":"207","author":"Chal\u00e9","year":"2022","journal-title":"Exp. Syst. Appl."},{"key":"ref60","doi-asserted-by":"crossref","first-page":"6430","DOI":"10.1109\/ACCESS.2021.3140015","article-title":"Generative deep learning to detect cyberattacks for the IoT-23 dataset","volume":"10","author":"Abdalgawad","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"ref61","doi-asserted-by":"crossref","first-page":"948","DOI":"10.37391\/ijeer.100432","article-title":"Hybrid deep-generative adversarial network based intrusion detection model for Internet of Things using binary particle swarm optimization","volume":"10","author":"Balaji","year":"2022","journal-title":"Int. J. Elect. Electron. Res."},{"issue":"4","key":"ref62","doi-asserted-by":"crossref","first-page":"524","DOI":"10.3390\/electronics11040524","article-title":"IMIDS: An intelligent intrusion detection system against cyber threats in IoT","volume":"11","author":"Le","year":"2022","journal-title":"Electronics"},{"issue":"5","key":"ref63","article-title":"Internet of Things-based deeply proficient monitoring and protection system for crop field","volume":"39","author":"Prabu","year":"2022","journal-title":"Exp. Syst."},{"issue":"1","key":"ref64","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TCSS.2021.3063538","article-title":"Intrusion detection for secure social Internet of Things based on collaborative edge computing: A generative adversarial network-based approach","volume":"9","author":"Nie","year":"2022","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511976"},{"issue":"1","key":"ref66","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1186\/s13677-022-00361-y","article-title":"NIDD: An intelligent network intrusion detection model for nursing homes","volume":"11","author":"Zhou","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref67","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.future.2022.03.007","article-title":"On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples","volume":"133","author":"Zhang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref68","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.future.2022.04.010","article-title":"SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system","volume":"134","author":"Zhang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3536425"},{"issue":"15","key":"ref70","doi-asserted-by":"crossref","first-page":"7726","DOI":"10.3390\/s22155822","article-title":"Towards an effective intrusion detection model using focal loss variational autoencoder for Internet of Things (IoT)","volume":"22","author":"Khanam","year":"2022","journal-title":"Sensors"},{"issue":"20","key":"ref71","first-page":"5822","article-title":"Towards developing a robust intrusion detection model using Hadoop\u2013Spark and data augmentation for IoT networks","volume":"22","author":"Sanchez","year":"2022","journal-title":"Sensors"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100699","article-title":"A deep learning approach for intrusion detection in Internet of Things using focal loss function","volume":"22","author":"Dina","year":"2023","journal-title":"Internet Things"},{"issue":"1","key":"ref73","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.32604\/csse.2023.039550","article-title":"A model training method for DDoS detection using CTGAN under 5GC traffic","volume":"47","author":"Kim","year":"2023","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref74","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.ins.2023.02.031","article-title":"An adversarial domain adaptation approach combining dual domain pairing strategy for IoT intrusion detection under few-shot samples","volume":"629","author":"Ma","year":"2023","journal-title":"Inf. Sci."},{"issue":"3","key":"ref75","doi-asserted-by":"crossref","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","article-title":"An enhanced AI-based network intrusion detection system using generative adversarial networks","volume":"10","author":"Park","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref76","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108626","article-title":"Anomaly based network intrusion detection for IoT attacks using deep learning technique","volume":"107","author":"Sharma","year":"2023","journal-title":"Comput. Elect. Eng."},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3307463"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605163"},{"issue":"1","key":"ref79","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/JIOT.2022.3200121","article-title":"CGAN-based collaborative intrusion detection for UAV networks: A blockchain-empowered distributed federated learning approach","volume":"10","author":"He","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"ref80","first-page":"2199","article-title":"Communication security analysis of intelligent transportation system using 5G Internet of Things from the perspective of big data","volume":"24","author":"He","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"12","key":"ref81","doi-asserted-by":"crossref","first-page":"5644","DOI":"10.3390\/s23125644","article-title":"Conditional tabular generative adversarial based intrusion detection system for detecting DDoS and DoS attacks on the Internet of Things networks","volume":"23","author":"Alabsi","year":"2023","journal-title":"Sensors"},{"key":"ref82","first-page":"12","article-title":"Data balancing and CNN based network intrusion detection system","volume-title":"Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)","author":"Elghalhoud"},{"issue":"5","key":"ref83","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1007\/s11276-022-03182-8","article-title":"Dynamic distributed generative adversarial network for intrusion detection system over Internet of Things","volume":"29","author":"Balaji","year":"2023","journal-title":"Wireless Netw."},{"issue":"2","key":"ref84","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2023.e13520","article-title":"EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT","volume":"9","author":"Li","year":"2023","journal-title":"Heliyon"},{"key":"ref85","first-page":"156","volume-title":"FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection","volume":"13867","author":"Wang","year":"2023"},{"key":"ref86","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105805","article-title":"GAN-AE: An unsupervised intrusion detection system for MQTT networks","volume":"119","author":"Boppana","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3584666"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CIoT57267.2023.10084911"},{"key":"ref89","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105669","article-title":"Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT botnet attacks detection","volume":"118","author":"Habibi","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"ref90","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1109\/JIOT.2021.3112159","article-title":"Intelligent intrusion detection for Internet of Things security: A deep convolutional generative adversarial network-enabled approach","volume":"10","author":"Wu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/EEI59236.2023.10212791"},{"issue":"4","key":"ref92","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1007\/s12083-023-01510-z","article-title":"IoT intrusion detection model based on gated recurrent unit and residual network","volume":"16","author":"Zhao","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref93","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110384","article-title":"Label noise analysis meets adversarial training: A defense against label poisoning in federated learning","volume":"266","author":"Hallaji","year":"2023","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"ref94","doi-asserted-by":"crossref","first-page":"253","DOI":"10.32604\/cmc.2023.032220","article-title":"Multi-zone-wise blockchain based intrusion detection and prevention system for IoT environment","volume":"74","author":"Kably","year":"2023","journal-title":"Comput. Materials Continua"},{"key":"ref95","first-page":"1","article-title":"Novel anomaly detection scheme for cyber physical system using C-GAN in fog assisted IoT environment","volume-title":"Proc. 2nd IEEE Int. Conf. Distrib. Comput. Elect. Circuits Electron. (ICDCECE)","author":"Mathur"},{"issue":"10","key":"ref96","doi-asserted-by":"crossref","first-page":"8357","DOI":"10.1109\/JIOT.2023.3234530","article-title":"OPTIMIST: Lightweight and transparent IDS with optimum placement strategy to mitigate mixed-rate DDoS attacks in IoT networks","volume":"10","author":"Bhale","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref97","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103622","article-title":"Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment","volume":"214","author":"Yao","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref98","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110005","article-title":"SIDS: A federated learning approach for intrusion detection in IoT using Social Internet of Things","volume":"236","author":"Amiri-Zarandi","year":"2023","journal-title":"Comput. Netw."},{"key":"ref99","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.103054","article-title":"Synthetic attack data generation model applying generative adversarial network for intrusion detection","volume":"125","author":"Kumar","year":"2023","journal-title":"Comput. Security"},{"issue":"2","key":"ref100","doi-asserted-by":"crossref","first-page":"2240","DOI":"10.11591\/ijece.v13i2.pp2240-2258","article-title":"Three level intrusion detection system based on conditional generative adversarial network","volume":"13","author":"Abdulameer","year":"2023","journal-title":"Int. J. Elect. Comput. Eng."},{"issue":"4","key":"ref101","doi-asserted-by":"crossref","first-page":"4951","DOI":"10.1109\/TNSM.2023.3260039","article-title":"Unsupervised GAN-based intrusion detection system using temporal convolutional networks and self-attention","volume":"20","author":"de Araujo-Filho","year":"2023","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"ref102","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103432","article-title":"WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS","volume":"134","author":"Srivastava","year":"2023","journal-title":"Comput. Security"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-021-00980-2"},{"key":"ref104","first-page":"199","article-title":"A method of network traffic anomaly detection based on packet window transformer","volume-title":"Proc. DSC","author":"Fang"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"48890","DOI":"10.1109\/ACCESS.2022.3172432","article-title":"A security model based on LightGBM and transformer to protect healthcare systems from cyberattacks","volume":"10","author":"Ghourabi","year":"2022","journal-title":"IEEE Access"},{"issue":"23","key":"ref106","doi-asserted-by":"crossref","first-page":"4017","DOI":"10.3390\/electronics11234017","article-title":"Anomaly detection in fog computing architectures using custom tab transformer for Internet of Things","volume":"11","author":"Alzahrani","year":"2022","journal-title":"Electronics"},{"key":"ref107","volume-title":"Autonomous anti-interference identification of textIoT device traffic based on convolutional neural network","author":"Liu","year":"2022"},{"key":"ref108","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2022.103692","article-title":"Light-weight federated learning-based anomaly detection for time-series data in industrial control systems","volume":"140","author":"Truong","year":"2022","journal-title":"Comput. Ind."},{"key":"ref109","first-page":"663","article-title":"A modified transformer neural network (MTNN) for robust intrusion detection in IoT networks","volume-title":"Proc. ITC-Egypt","author":"Ahmed"},{"issue":"10","key":"ref110","first-page":"12","article-title":"Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection","volume":"18","author":"Rodr\u00edguez","year":"2023","journal-title":"PLoS ONE"},{"issue":"4","key":"ref111","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3390\/technologies11040107","article-title":"Deep learning techniques for Web-based attack detection in industry 5.0: A novel approach","volume":"11","author":"Salam","year":"2023","journal-title":"Technologies"},{"issue":"1","key":"ref112","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"2014","journal-title":"Digit. Commun. Netw."},{"key":"ref113","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103465","article-title":"Network intrusion detection based on the temporal convolutional model","volume":"135","author":"Lopes","year":"2023","journal-title":"Comput. Security"},{"key":"ref114","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109982","article-title":"Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things","volume":"235","author":"Wang","year":"2023","journal-title":"Comput. Netw."},{"key":"ref115","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.neunet.2023.05.047","article-title":"SCADA securing system using deep learning to prevent cyber infiltration","volume":"165","author":"Diaba","year":"2023","journal-title":"Neural Netw."},{"issue":"9","key":"ref116","doi-asserted-by":"crossref","first-page":"2100","DOI":"10.3390\/electronics12092100","article-title":"Securing a smart home with a transformer-based IoT intrusion detection system","volume":"12","author":"Wang","year":"2023","journal-title":"Electronics"},{"key":"ref117","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110072","article-title":"TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT networks","volume":"237","author":"Ullah","year":"2023","journal-title":"Comput. Netw."},{"key":"ref118","first-page":"216","article-title":"TransIDS: A transformer-based approach for intrusion detection in Internet of Things using label smoothing","volume-title":"Proc. IEEE ICCEA","author":"Wang"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17356-9"},{"key":"ref120","volume-title":"Generative adversarial networks","author":"Goodfellow","year":"2014"},{"key":"ref121","volume-title":"Autoencoders","author":"Bank","year":"2021"},{"key":"ref122","volume-title":"Attention is all you need","author":"Vaswani","year":"2023"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00574-9"},{"key":"ref124","volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic","author":"Garcia","year":"2021"},{"key":"ref125","volume-title":"KDD cup 1999 data","author":"Stolfo","year":"1999"},{"key":"ref126","volume-title":"NSL-KDD","author":"Mohi-ud din","year":"2018"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref130","first-page":"1","article-title":"Toward generating a new intrusion detection Dataset and intrusion traffic characterization","volume-title":"Proc. Int. Conf. Inf. Syst. Security Privacy","author":"Sharafaldin"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"1","key":"ref132","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/S0034-4257(97)00083-7","article-title":"Selecting and interpreting measures of thematic classification accuracy","volume":"62","author":"Stehman","year":"1997","journal-title":"Remote Sens. Environ."},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630270302"},{"key":"ref134","first-page":"12","article-title":"Message understanding conference-6: A brief history","volume-title":"Proc. 16th Int. Conf. Comput. Linguist. COLING","author":"Grishman"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1126\/science.182.4116.990"},{"issue":"2","key":"ref136","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","article-title":"Comparison of the predicted and observed secondary structure of T4 phage lysozyme","volume":"405","author":"Matthews","year":"1975","journal-title":"Biochimica et Biophysica Acta"},{"issue":"1","key":"ref137","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","author":"Cohen","year":"1960","journal-title":"Educ. Psychol. Meas."},{"issue":"8","key":"ref138","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An introduction to ROC analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_1"},{"key":"ref141","first-page":"1","article-title":"CICIoMT2024: Attack vectors in healthcare devices\u2014A multi-protocol dataset for assessing IoMT device security","volume-title":"Proc. CiCIoMT","author":"Dadkhah"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65172-4_11"},{"key":"ref143","volume-title":"How faithful is your synthetic data? Sample-level metrics for evaluating and auditing generative models","author":"Alaa","year":"2022"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"ref145","volume-title":"Linformer: Self-attention with linear complexity","author":"Wang","year":"2020"},{"key":"ref146","volume-title":"Rethinking attention with performers","author":"Choromanski","year":"2022"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11012727.pdf?arnumber=11012727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:43:03Z","timestamp":1749620583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11012727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":146,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3573194","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}