Generative adversarial networks: A survey toward private and secure applications

Z Cai, Z **ong, H Xu, P Wang, W Li, Y Pan - ACM Computing Surveys …, 2021 - dl.acm.org
Generative Adversarial Networks (GANs) have promoted a variety of applications in
computer vision and natural language processing, among others, due to its generative …

A comprehensive survey of generative adversarial networks (GANs) in cybersecurity intrusion detection

A Dunmore, J Jang-Jaccard, F Sabrina, J Kwak - IEEE Access, 2023 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) have seen significant interest since their
introduction in 2014. While originally focused primarily on image-based tasks, their capacity …

[HTML][HTML] Generative AI in medical practice: in-depth exploration of privacy and security challenges

Y Chen, P Esmaeilzadeh - Journal of Medical Internet Research, 2024 - jmir.org
As advances in artificial intelligence (AI) continue to transform and revolutionize the field of
medicine, understanding the potential uses of generative AI in health care becomes …

The future of forecasting for renewable energy

C Sweeney, RJ Bessa, J Browell… - … Reviews: Energy and …, 2020 - Wiley Online Library
Forecasting for wind and solar renewable energy is becoming more important as the amount
of energy generated from these sources increases. Forecast skill is improving, but so too is …

Mobile sensor data anonymization

M Malekzadeh, RG Clegg, A Cavallaro… - Proceedings of the …, 2019 - dl.acm.org
Motion sensors such as accelerometers and gyroscopes measure the instant acceleration
and rotation of a device, in three dimensions. Raw data streams from motion sensors …

[HTML][HTML] Fedopt: Towards communication efficiency and privacy preservation in federated learning

M Asad, A Moustafa, T Ito - Applied Sciences, 2020 - mdpi.com
Artificial Intelligence (AI) has been applied to solve various challenges of real-world
problems in recent years. However, the emergence of new AI technologies has brought …

Protecting sensory data against sensitive inferences

M Malekzadeh, RG Clegg, A Cavallaro… - Proceedings of the 1st …, 2018 - dl.acm.org
There is growing concern about how personal data are used when users grant applications
direct access to the sensors of their mobile devices. In fact, high resolution temporal data …

[PDF][PDF] Detection of cyberattacks using bidirectional generative adversarial network

R Vallabhaneni, SA Vaddadi, S Pillai… - Indonesian Journal of …, 2024 - academia.edu
Due to the progress of communication technologies, diverse information is transmitted in
distributed systems via a network model. Concurrently, with the evolution of communication …

PrivacyNet: Semi-adversarial networks for multi-attribute face privacy

V Mirjalili, S Raschka, A Ross - IEEE Transactions on Image …, 2020 - ieeexplore.ieee.org
Recent research has established the possibility of deducing soft-biometric attributes such as
age, gender, and race from an individual's face image with high accuracy. However, this …

Optimal utility-privacy trade-off with total variation distance as a privacy measure

B Rassouli, D Gündüz - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The total variation distance is proposed as a privacy measure in an information disclosure
scenario when the goal is to reveal some information about available data in return of utility …