{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:27:33Z","timestamp":1761719253862,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Industrial Internet Innovation and Development Project Grant","award":["TC210804R"],"award-info":[{"award-number":["TC210804R"]}]},{"name":"National key research and development program","award":["2022YFB3103602"],"award-info":[{"award-number":["2022YFB3103602"]}]},{"name":"the Fundamental Research Funds for the Central Universities"},{"name":"Beijing Natural Science Foundation","award":["L222005"],"award-info":[{"award-number":["L222005"]}]},{"name":"CCF-NSFOCUS Kun-Peng Scientific Research Fund","award":["CCF-NSFOCUS202215"],"award-info":[{"award-number":["CCF-NSFOCUS202215"]}]},{"name":"Special Project for Industrial Foundation Reconstruction and High-quality Development of Manufacturing Industry","award":["0747-2361SCCZA194"],"award-info":[{"award-number":["0747-2361SCCZA194"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1145\/3627341.3630381","type":"proceedings-article","created":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T12:07:01Z","timestamp":1702642021000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Reference Model for Information Security Applications of Generative Adversarial Network Variants"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9219-3756","authenticated-orcid":false,"given":"Sheng","family":"Hong","sequence":"first","affiliation":[{"name":"Beihang University, China and \rNanchang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2128-9658","authenticated-orcid":false,"given":"Yizhong","family":"Lai","sequence":"additional","affiliation":[{"name":"Nanchang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9899-8981","authenticated-orcid":false,"given":"Yuzhou","family":"Li","sequence":"additional","affiliation":[{"name":"Power Dispatch and Control Center of State Grid Yan'an Power Supply Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9402-8541","authenticated-orcid":false,"given":"Yang","family":"You","sequence":"additional","affiliation":[{"name":"Nsfocus Technology Group Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6148-6043","authenticated-orcid":false,"given":"Shuai","family":"Ou","sequence":"additional","affiliation":[{"name":"Nsfocus Technology Group Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1966-9049","authenticated-orcid":false,"given":"Fei","family":"Han","sequence":"additional","affiliation":[{"name":"Nsfocus Technology Group Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7748-964X","authenticated-orcid":false,"given":"Tiejun","family":"Wu","sequence":"additional","affiliation":[{"name":"Nsfocus Technology Group Company, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"volume-title":"Adversarial examples for generative models. In 2018 ieee security and privacy workshops (spw) (pp. 36-42)","author":"Kos J.","key":"e_1_3_2_1_1_1","unstructured":"Kos, J., Fischer, I., & Song, D. (2018, May). Adversarial examples for generative models. In 2018 ieee security and privacy workshops (spw) (pp. 36-42). IEEE."},{"key":"e_1_3_2_1_2_1","volume-title":"DAGAN: deep de-aliasing generative adversarial networks for fast compressed sensing MRI reconstruction","author":"Yang G.","year":"2017","unstructured":"Yang, G., Yu, S., Dong, H., Slabaugh, G., Dragotti, P. L., Ye, X., ... & Firmin, D. (2017). DAGAN: deep de-aliasing generative adversarial networks for fast compressed sensing MRI reconstruction. IEEE transactions on medical imaging, 37(6), 1310-1321."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/aa8c36"},{"key":"e_1_3_2_1_4_1","volume-title":"Network information security solution for electricity. Automation of Electric Power Systems","author":"Shang J.","year":"2003","unstructured":"Shang, J., Huang, Y., Meng, Y., He, N., & Chen, W. (2003). Network information security solution for electricity. Automation of Electric Power Systems."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083421"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11009-3_29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.323"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"e_1_3_2_1_11_1","volume-title":"SEGAN: Speech enhancement generative adversarial network. arXiv preprint arXiv:1703.09452","author":"Pascual S.","year":"2017","unstructured":"Pascual, S., Bonafonte, A., & Serra, J. (2017). SEGAN: Speech enhancement generative adversarial network. arXiv preprint arXiv:1703.09452."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/48\/48\/485101"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308284"},{"key":"e_1_3_2_1_14_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford A.","year":"2015","unstructured":"Radford, A., Metz, L., & Chintala, S. (2015). Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2015.1022890"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/49\/19\/195101"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.629"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.107067"}],"event":{"name":"ICCVIT 2023: International Conference on Computer, Vision and Intelligent Technology","acronym":"ICCVIT 2023","location":"Chenzhou China"},"container-title":["Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630381","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627341.3630381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:01:13Z","timestamp":1755900073000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":18,"alternative-id":["10.1145\/3627341.3630381","10.1145\/3627341"],"URL":"https:\/\/doi.org\/10.1145\/3627341.3630381","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"2023-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}