{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:09Z","timestamp":1755907689437,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,26]]},"DOI":"10.1145\/3653644.3658510","type":"proceedings-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T18:24:49Z","timestamp":1726856689000},"page":"227-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Financial Data Analysis and Prediction Based on Generative Adversarial Fill-in Network Optimisation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0042-3861","authenticated-orcid":false,"given":"Gang","family":"Yang","sequence":"first","affiliation":[{"name":"Teaching and research section of financial technology, Zhejiang Institute of Economics and Trade, Hangzhou, Zhejiang, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109363"},{"key":"e_1_3_2_1_2_1","volume-title":"Fine-grained Image Inpainting with Scale-Enhanced Generative Adversarial Network.Pattern Recognition Letters","author":"Liu W","year":"2021","unstructured":"Liu W , Caoliu C J , Ren C , Wei Y , Guo H. Fine-grained Image Inpainting with Scale-Enhanced Generative Adversarial Network.Pattern Recognition Letters,. 2021, 143(8):81-87."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Dewi C Chen R C Liu Y T .Synthetic Traffic Sign Image Generation Applying Generative Adversarial Networks.Vietnam Journal of Computer Science 2022 9 (2):333-348.","DOI":"10.1142\/S2196888822500191"},{"key":"e_1_3_2_1_4_1","volume-title":"Dubey S R .CDGAN: Cyclic Discriminative Generative Adversarial Networks for image-to-image transformation","author":"Babu K K","year":"2022","unstructured":"Babu K K , Dubey S R .CDGAN: Cyclic Discriminative Generative Adversarial Networks for image-to-image transformation.Academic Press, 2022, 82(Jan.). 1-10."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Yu H .An Effective Model for Forecasting Travel Consumer Demand Using Big Data Analysis.Advances in Data Science and Adaptive Analysis 2022 14(1\/2):1 -21.","DOI":"10.1142\/S2424922X22500048"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejmp.2021.02.015"},{"issue":"7","key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Multidimensional Intelligent Distribution Network Load Analysis and Forecasting Management System Based on Multidata Fusion Technology.","volume":"2021","author":"Cheng W","year":"2021","unstructured":"Cheng W , Cheng R , Liu J , Ma W , Li J , Guan W. Multidimensional Intelligent Distribution Network Load Analysis and Forecasting Management System Based on Multidata Fusion Technology.Mathematical Problems in Engineering, 2021, 2021(7):1-24.","journal-title":"Mathematical Problems in Engineering"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"19","article-title":"Stock Market Prediction Using Generative Adversarial Networks (GANs)","volume":"47","author":"Dael F A","year":"2023","unstructured":"Dael F A, Yavuz \u00d6 \u00c7, Yavuz U. Stock Market Prediction Using Generative Adversarial Networks (GANs): Hybrid Intelligent Model. Comput. Syst. Sci. Eng., 2023, 47(1): 19-35.","journal-title":"Hybrid Intelligent Model. Comput. Syst. Sci. Eng."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.agrformet.2021.108558"},{"key":"e_1_3_2_1_10_1","volume-title":"Toward Efficiently Evaluating the Robustness of Deep Neural Networks in IoT Systems: a GAN-Based Method","author":"Bai T","year":"2022","unstructured":"Bai T , Zhao J , Zhu J ,Han S , Chen J , Li B. Toward Efficiently Evaluating the Robustness of Deep Neural Networks in IoT Systems: a GAN-Based Method.IEEE internet of things journal, 2022, 9(3):1875-1884."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102526"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Zhu Q X Xu T X Xu Y .Improved Virtual Sample Generation Method Using Enhanced Conditional Generative Adversarial Networks with Cycle Structures for Soft Sensors with Limited Data.Industrial & Engineering Chemistry Research 2022 61(1):530-540.","DOI":"10.1021\/acs.iecr.1c03197"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2020.09.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Antonio Emanuele Cin\u00e1 Torcinovich A Pelillo M .A Black-box Adversarial Attack for Poisoning Clustering.Pattern Recognition 2021 122(10). 108306-108317.","DOI":"10.1016\/j.patcog.2021.108306"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.47852\/bonviewAAES32021326"},{"key":"e_1_3_2_1_16_1","volume-title":"Neural Networks","author":"Zhang J","year":"2023","unstructured":"Zhang J , Qian W , Nie R , Cao J , Xu D. Generate adversarial examples by adaptive moment iterative fast gradient sign method.Applied Intelligence: the International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies, 2023, 53(1):1101-1114."}],"event":{"name":"FAIML 2024: 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning","acronym":"FAIML 2024","location":"Yichang China"},"container-title":["Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3658510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3653644.3658510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:25:24Z","timestamp":1755879924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3658510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,26]]},"references-count":16,"alternative-id":["10.1145\/3653644.3658510","10.1145\/3653644"],"URL":"https:\/\/doi.org\/10.1145\/3653644.3658510","relation":{},"subject":[],"published":{"date-parts":[[2024,4,26]]},"assertion":[{"value":"2024-09-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}