Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 433-437.

• Information Security • Previous Articles     Next Articles

Network Security Situation Forecast Based on Differential WGAN

WGAN Ting-ting, ZHU Jiang   

  1. (School of Communication and Information Engineering,Chongqing University of Post and Telecommunications,Chongqing 400065,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: A network security posture prediction mechanism based on differential WGAN(Wasserstein- GAN) is presented in this paper.This mechanism uses Generative adversarial network (GAN) to simulate the development process of the situation,and realizes the situation forecast from the time Dimension.In order to solve the problem of difficult network training,collapse mode and gradient instability of GAN,this paper put forward the method by using Wasserstein distance as the loss function of GAN and adding the difference term in the loss function,to improve the classification precision of the situation value.The stability of the differential WGAN network was also proved.Experimental andanalysis results show that this mechanism has advantages over other mechanisms in terms of convergence,accuracy and complexity.

Key words: Difference, Generative adversarial network, Situation forecast, Situational awareness, Wasserstein-GAN

CLC Number: 

  • TN918.1
[5]ZHANG H,XU T,LI H.StackGAN:Text to Photo-Realistic Image Synthesis with Stacked Generative Adversarial Networks[C]∥IEEE International Confernece on Computer Vision(ICCV),2016:5908-5916.
[7]CHANG J,SCHERER S.Learning representations of emotional speech with deep convolutional generative adversarial networks[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2017:2746-2750.
[8]ZHAO Y,TAKAKI S,LUONG H T,et al.Wasserstein GAN Waveform Loss-based acoustic model training form Multi-speaker Text-toSpeechsynthesis systems using a wav Net roco-der[J].IEEE Access,2017:7(1):1-10.
[10]RADFORD A,METZ L,CHINTALA S.Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks[J].Computer Science,2015.
[13]SRIVASTAVA A,VALKOV L,RUSSELL C,et al.VEEGAN:Reducing Mode Collapse in GANs using Implicit Variational Learning[J].arXiv:1705.07761,2017.
[16]NAKAJO K.Improved gradient method for monotone and lipschitz continuous mappings in banach spaces[J].Acta Mathematica Scientia(English Series),2017,37(2):342-354.
[18]MUKKAMALA M C,HEIN M.Variants of RMSProp and Adagrad with Logarithmic Regret Bounds[J].IEEE Transactions Biomed Engineering,2017,5(6):1220-1228.
[19]QIU Z,YAN Z,FEI Y,et al.RGB-DI Images and Fall Convolution Nuernal Network-Based Outdoor Scene Understanding for Mobile Robots.IEEE Transactions on Instrumentation & Measurement,2018,1(99):1-11.
[20]IOFFE S,SZEGEDY C.Batch Normalization:Accelerating Deep Network Training by Reducing Internal Covariate Shift[J].arXiv:1502.03167,2015.
[1] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[2] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[3] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[4] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[5] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[6] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[7] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[8] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[9] CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164.
[10] DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202.
[11] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[12] LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184.
[13] SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39.
[14] LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91.
[15] TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115.
Full text



No Suggested Reading articles found!