Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200189-9.doi: 10.11896/jsjkx.241200189
• Information Security • Previous Articles Next Articles
YANG Lin1, LIN Honggang1,2
CLC Number:
| [1]ZHANG W,LIU Y,FENG Y,et al.A Comprehensive Review of Network Reconnaissance and Defense Technologies [J].Communications Technology,2022,55(10):1247-1256. [2]HUI S,WANG H,WANG Z,et al.Knowledge Enhanced GANfor IoT Traffic Generation[C]//Proceedings of the ACM Web Conference.2022:3336-3346. [3]JIA Z P,FANG B X,LIU C G,et al.Overview of Network Deception Techniques [J].Journal of Communications,2017,38(12):128-143. [4]GOODFELLOW I,POUGET-ABADIE J,MIRZA M,et al.Ge-nerative Adversarial Nets[C]//28th Conference on Neural Information Processing Systems(NIPS).2014. [5]WANG J,LU B,ZHU Y F.A Survey on the Generation and Application of Adversarial Network Traffic [J].Computer Science,2022,49(S2):651-661. [6]ZHANG X,HAMM J,REITER M K,et al.Statistical Privacy for Streaming Traffic[C]//Proceedings of the 26th ISOC Symposium on Network and Distributed System Security.2019. [7]HU Y J,GUO Y B,MA J,et al.Method for Generating Network Deceptive Traffic Based on Adversarial Samples [J].Journal of Communications,2020,41(9):59-70. [8]MOORE A,ZUEV D,CROGAN M.Discriminators for use in flow-based classification[EB/OL].https://www.cl.cam.ac.uk/~awm22/publication/RR-05-13.pdf. [9]RIGAKI M.Adversarial Deep Learning Against Intrusion Detection Classifiers[C]//2017 NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience(IST-152 2017).2017. [10]HUANG C H,LEE T H,CHANG L,et al.Adversarial Attacks on SDN-based Deep Learning IDS System[C]//Mobile and Wireless Technology 2018:International Conference on Mobile and Wireless Technology(ICMWT 2018).Springer,2019:181-191. [11]IBITOYE O,SHAFIQ O,MATRAWY A.Analyzing AdversarialAttacks Against Deep Learning for Intrusion Detection inIoT Networks[C]//2019 IEEE Global Communications Conference(GLOBECOM).IEEE,2019:1-6. [12]LI J,ZHOU L,LI H,et al.Dynamic Traffic Feature Camouflaging Via Generative Adversarial Networks[C]//2019 IEEE Conference on Communications and Network Security(CNS).IEEE,2019:268-276. [13]CHOUGULE A,AGRAWAL K,CHAMOLA V.Scan-gan:Generative Adversarial Network Based Synthetic Data Generation Technique for Controller Area Network[J].IEEE Internet of Things Magazine,2023,6(3):126-130. [14]ANANDE T J,AL-SAADI S,LEESON M S.Generative Adversarial Networks for Network Traffic Feature Generation[J].International Journal of Computers and Applications,2023,45(4):297-305. [15]HUI S,WANG H,WANG Z,et al.Knowledge Enhanced GAN forIoT Traffic Generation[C]//Proceedings of the ACM Web Conference 2022.2022:3336-3346. [16]HUANG Y,CHEN Y,ZHANG Y,et al.TFHM:A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:175-182. [17]LI J,ZHOU L,LI H X,et al.Network Traffic Feature Camouflage Technology Based on Generative Adversarial Networks [J].Computer Engineering,2019,45(12):119-126. [18]SIVANATHAN A,SHERRATT D,GHARAKHEILI H H,et al.Characterizing and Classifying IoT Traffic in Smart Cities and Campuses[C]//2017 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2017:559-564. [19]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT Sentinel:Automated Device-type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184. [20]LI J,WANG D,LI S,et al.Deep Learning Based Adaptive Sequential Data Augmentation Technique for the Optical Network Traffic Synthesis[J].Optics Express,2019,27(13):18831-18847. |
| [1] | GAO Xinjun, ZHANG Meixin, ZHU Li. Study on Short-time Passenger Flow Data Generation and Prediction Method for RailTransportation [J]. Computer Science, 2025, 52(6A): 240600017-5. |
| [2] | ZHANG Yaolin, LIU Xiaonan, DU Shuaiqi, LIAN Demeng. Hybrid Quantum-classical Compressed Generative Adversarial Networks Based on Matrix Product Operators [J]. Computer Science, 2025, 52(6): 74-81. |
| [3] | LIU Huayong, ZHU Ting. Semi-supervised Cross-modal Hashing Method for Semantic Alignment Networks Basedon GAN [J]. Computer Science, 2025, 52(6): 159-166. |
| [4] | DING Ruiyang, SUN Lei, DAI Leyu, ZANG Weifei, XU Bayi. Generation Method for Adversarial Networks Traffic Based on Universal Perturbations [J]. Computer Science, 2025, 52(2): 336-343. |
| [5] | LIU Yulu, WU Shuhong, YU Dan, MA Yao, CHEN Yongle. Cross-age Identity Membership Inference Based on Attention Feature Decomposition [J]. Computer Science, 2024, 51(9): 401-407. |
| [6] | GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223. |
| [7] | HE Zhilin, GU Tianhao, XU Guanhua. Few-shot Semi-supervised Semantic Image Translation Algorithm Based on Prototype Correction [J]. Computer Science, 2024, 51(8): 224-231. |
| [8] | ZHANG Le, YU Ying, GE Hao. Mural Inpainting Based on Fast Fourier Convolution and Feature Pruning Coordinate Attention [J]. Computer Science, 2024, 51(6A): 230400083-9. |
| [9] | ZHUO Peiyan, ZHANG Yaona, LIU Wei, LIU Zijin, SONG You. CTGANBoost:Credit Fraud Detection Based on CTGAN and Boosting [J]. Computer Science, 2024, 51(6A): 230600199-7. |
| [10] | XING Kaiyan, CHEN Wen. Multi-generator Active Learning Algorithm Based on Reverse Label Propagation and ItsApplication in Outlier Detection [J]. Computer Science, 2024, 51(4): 359-365. |
| [11] | ZHANG Guodong, CHEN Zhihua, SHENG Bin. Infrared Small Target Detection Based on Dilated Convolutional Conditional GenerativeAdversarial Networks [J]. Computer Science, 2024, 51(2): 151-160. |
| [12] | WANG Bo, ZHAO Jincheng, XU Bingfeng, HE Gaofeng. Zero Day Attack Detection Method for Internet of Vehicles [J]. Computer Science, 2024, 51(12): 334-342. |
| [13] | YE Ruiwen, WANG Baohui. 3D Reconstruction Algorithm for Lower Limb X-ray Images Based on Generative AdversarialNetworks [J]. Computer Science, 2024, 51(11A): 230900089-7. |
| [14] | FAN Yi, HU Tao, YI Peng. System Call Host Intrusion Detection Technology Based on Generative Adversarial Network [J]. Computer Science, 2024, 51(10): 408-415. |
| [15] | WU Guibin, YANG Zongyuan, XIONG Yongping, ZHANG Xing, WANG Wei. Seal Removal Based on Generative Adversarial Gated Convolutional Network [J]. Computer Science, 2024, 51(1): 198-206. |
|
||