{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T05:01:54Z","timestamp":1770526914851,"version":"3.49.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064833","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:46:29Z","timestamp":1746261989000},"page":"1731-1746","source":"Crossref","is-referenced-by-count":1,"title":["DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme"],"prefix":"10.32604","volume":"84","author":[{"given":"Dawei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yue","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Min","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baokun","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiaxuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102919","DOI":"10.1016\/j.cose.2022.102919","article-title":"MEMBER: a multi-task learning model with hybrid deep features for network intrusion detection","volume":"123","author":"Lan","year":"2022","journal-title":"Comput Secur"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-024-00886-w","article-title":"Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction","volume":"11","author":"Talukder","year":"2024","journal-title":"J Big Data"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/JSAC.2023.3310072","article-title":"When moving target defense meets attack prediction in digital twins: a convolutional and hierarchical reinforcement learning approach","volume":"41","author":"Tao","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5999","DOI":"10.1109\/TMC.2023.3315324","article-title":"POTA: privacy-preserving online multi-task assignment with path planning","volume":"23","author":"Zhang","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/TII.2022.3190556","article-title":"How to mitigate DDoS intelligently in SD-IoV: a moving target defense approach","volume":"19","author":"Zhang","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref6","unstructured":"Alatwi HA, Morisset C. Adversarial machine learning in network intrusion detection domain: a systematic review. arXiv:2112.03315. 2021."},{"key":"ref7","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv:1412.6572. 2014."},{"key":"ref8","series-title":"Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P)","article-title":"The limitations of deep learning in adversarial settings","author":"Papernot","year":"2016 Mar 21\u201324"},{"key":"ref9","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"2574","article-title":"DeepFool: a simple and accurate method to fool deep neural networks","author":"Moosavi-Dezfooli","year":"2016 Jun 27\u201330"},{"key":"ref10","series-title":"Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP)","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"2017 May 22\u201326"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2016","journal-title":"Commun ACM"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"107646","DOI":"10.1016\/j.patcog.2020.107646","article-title":"Tackling mode collapse in multi-generator GANs with orthogonal vectors","volume":"110","author":"Li","year":"2021","journal-title":"Pattern Recognit"},{"key":"ref13","unstructured":"Kurach K, Lucic M, Zhai X, Michalski M, Gelly S. The GAN landscape: losses, architectures, regularization, and normalization. arXiv:1807.04720. 2018."},{"key":"ref14","first-page":"3481","article-title":"Which training methods for GANs do actually converge?","volume":"80","author":"Mescheder","year":"2018","journal-title":"Proc Mach Learn Res"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3439","DOI":"10.1109\/TDSC.2023.3330171","article-title":"NANO: cryptographic enforcement of readability and editability governance in blockchain databases","volume":"21","author":"Zhang","year":"2024","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref16","unstructured":"Arjovsky M, Chintala S, Bottou L. Wasserstein GAN. arXiv:1701.07875. 2017."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/TIFS.2023.3331240","article-title":"TMG-GAN: generative adversarial networks-based imbalanced learning for network intrusion detection","volume":"19","author":"Ding","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","article-title":"An enhanced AI-based network intrusion detection system using generative adversarial networks","volume":"10","author":"Park","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/MNET.105.2100353","article-title":"Adversarial attacks for intrusion detection based on bus traffic","volume":"36","author":"He","year":"2022","journal-title":"IEEE Netw"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102922","DOI":"10.1016\/j.cose.2022.102922","article-title":"Black box attack and network intrusion detection using machine learning for malicious traffic","volume":"123","author":"Zhu","year":"2022","journal-title":"Comput Secur"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"e0275971","DOI":"10.1371\/journal.pone.0275971","article-title":"Adversarial attacks against supervised machine learning based network intrusion detection systems","volume":"17","author":"Alshahrani","year":"2022","journal-title":"PLoS One"},{"key":"ref22","unstructured":"Zolbayar BE, Sheatsley R, Mcdaniel P, Weisman M, Zhu S, Krishnamurthy SV. Generating practical adversarial network traffic flows using NIDSGAN. arXiv:abs\/2203.06694. 2022."},{"key":"ref23","series-title":"Proceedings of the ICASSP 2024\u20142024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","article-title":"A targeted adversarial attack method for multi-classification malicious traffic detection","author":"Sun","year":"2024 Apr 14\u201319"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"91116","DOI":"10.1109\/ACCESS.2023.3307463","article-title":"Anomaly-based intrusion on IoT networks using AIGAN\u2014a generative adversarial network","volume":"11","author":"Liu","year":"2023","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1002\/047174882X","author":"Cover","year":"2005","journal-title":"Elements of information theory"},{"key":"ref26","unstructured":"Hoang Q, Nguyen TD, Le T, Phung D. Multi-generator generative adversarial nets. arXiv:1708.02556. 2017."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/TIFS.2023.3283104","article-title":"Achieving privacy-preserving and verifiable support vector machine training in the cloud","volume":"18","author":"Hu","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref28","doi-asserted-by":"crossref","unstructured":"Xiao C, Li B, Zhu JY, He W, Liu M, Song D. Generating adversarial examples with adversarial networks. arXiv:1801.02610. 2019.","DOI":"10.24963\/ijcai.2018\/543"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64833\/TSP_CMC_64833.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:21Z","timestamp":1763343381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064833","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}