Development of an end-to-end deep learning framework for sign language recognition, translation, and video generation

B Natarajan, E Rajalakshmi, R Elakkiya… - IEEE …, 2022 - ieeexplore.ieee.org
The recent developments in deep learning techniques evolved to new heights in various
domains and applications. The recognition, translation, and video generation of Sign …

Enhancing small medical dataset classification performance using GAN

M Alauthman, A Al-Qerem, B Sowan, A Alsarhan… - Informatics, 2023 - mdpi.com
Develo** an effective classification model in the medical field is challenging due to limited
datasets. To address this issue, this study proposes using a generative adversarial network …

[HTML][HTML] A genomic rule-based KNN model for fast flux botnet detection

FE Ayo, JB Awotunde, SO Folorunso… - Egyptian Informatics …, 2023 - Elsevier
Abstract Fast Flux Botnet (FFB) is an advance method developed by cyber criminals to
perpetrate distributed malicious attacks. The major problems of existing FFB detection …

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using generative adversarial networks

PT Duy, NH Khoa, H Do Hoang, VH Pham - Journal of Information …, 2023 - Elsevier
Abstract Recently, Software Defined Networking (SDN) has emerged as the key technology
in programming and orchestrating security policy in the security operations centers (SOCs) …

A survey on the application of generative adversarial networks in cybersecurity: prospective, direction and open research scopes

MM Arifin, MS Ahmed, TK Ghosh, IA Udoy… - arxiv preprint arxiv …, 2024 - arxiv.org
With the proliferation of Artificial Intelligence, there has been a massive increase in the
amount of data required to be accumulated and disseminated digitally. As the data are …

A comparison study of generative adversarial network architectures for malicious cyber-attack data generation

N Peppes, T Alexakis, K Demestichas… - Applied Sciences, 2023 - mdpi.com
The digitization trend that prevails nowadays has led to increased vulnerabilities of tools and
technologies of everyday life. One of the many different types of software vulnerabilities and …

Evasion generative adversarial network for low data regimes

RH Randhawa, N Aslam… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
A myriad of recent literary works have leveraged generative adversarial networks (GANs) to
generate unseen evasion samples. The purpose is to annex the generated data with the …

[HTML][HTML] Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection

RH Randhawa, N Aslam, M Alauthman… - Future Generation …, 2024 - Elsevier
Botnet detectors based on machine learning are potential targets for adversarial evasion
attacks. Several research works employ adversarial training with samples generated from …

Securing emerging IoT environments with super learner ensembles

A Ishtaiwi, A Al Maqousi… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
This paper investigates the efficacy of the Super Learner ensemble algorithm for robust
anomaly detection in Internet of Things (IoT) network traffic. The recently released CIC IoT …

An enhanced BiGAN architecture for network intrusion detection

M Arafah, I Phillips, A Adnane, M Alauthman… - Knowledge-Based …, 2025 - Elsevier
Intrusion detection systems face significant challenges in handling high-dimensional, large-
scale, and imbalanced network traffic data. This paper proposes a new architecture …