Breaking and Healing: GAN-Based Adversarial Attacks and Post-Adversarial Recovery for 5G IDSs
Generative adversarial networks (GANs) have advanced rapidly in data augmentation and generation, and researchers have been exploring their applications in other areas, including adversarial attack generation. GANs have significantly improved the field of adversarial attacks, especially against intr...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Yasmeen Alslman, Mouhammd Alkasassbeh, Mohammad J. Abdel-Rahman |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11075744/ |
Similar Items
A Defensive Strategy Against Android Adversarial Malware Attacks
by: Fabrice Setephin Atedjio, et al.
Published: (2024-01-01)
by: Fabrice Setephin Atedjio, et al.
Published: (2024-01-01)
Adversarial Training Methods for Deep Learning: A Systematic Review
by: Weimin Zhao, et al.
Published: (2022-08-01)
by: Weimin Zhao, et al.
Published: (2022-08-01)
Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation
by: Hiskias Dingeto, et al.
Published: (2023-07-01)
by: Hiskias Dingeto, et al.
Published: (2023-07-01)
DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks
by: Fangwei Wang, et al.
Published: (2023-02-01)
by: Fangwei Wang, et al.
Published: (2023-02-01)
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)
by: Ximeng LIU, et al.
Published: (2020-10-01)
Adversarial attacks and defenses in deep learning
by: LIU Ximeng, et al.
Published: (2020-10-01)
by: LIU Ximeng, et al.
Published: (2020-10-01)
Polymorphic Adversarial Cyberattacks Using WGAN
by: Ravi Chauhan, et al.
Published: (2021-12-01)
by: Ravi Chauhan, et al.
Published: (2021-12-01)
HAG-NET: Hiding Data and Adversarial Attacking with Generative Adversarial Network
by: Haiju Fan, et al.
Published: (2024-03-01)
by: Haiju Fan, et al.
Published: (2024-03-01)
Generating Adversarial Examples in One Shot With Image-to-Image Translation GAN
by: Weijia Zhang
Published: (2019-01-01)
by: Weijia Zhang
Published: (2019-01-01)
On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review
by: Noora Al Roken, et al.
Published: (2025-09-01)
by: Noora Al Roken, et al.
Published: (2025-09-01)
Point Cloud Adversarial Perturbation Generation for Adversarial Attacks
by: Fengmei He, et al.
Published: (2023-01-01)
by: Fengmei He, et al.
Published: (2023-01-01)
Multitask adversarial attack with dispersion amplification
by: Pavlo Haleta, et al.
Published: (2021-09-01)
by: Pavlo Haleta, et al.
Published: (2021-09-01)
On the adversarial robustness of aerial detection
by: Yuwei Chen, et al.
Published: (2024-11-01)
by: Yuwei Chen, et al.
Published: (2024-11-01)
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems
by: Sahar Aldhaheri, et al.
Published: (2023-09-01)
by: Sahar Aldhaheri, et al.
Published: (2023-09-01)
RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic
by: Sarah Alkadi, et al.
Published: (2024-04-01)
by: Sarah Alkadi, et al.
Published: (2024-04-01)
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation
by: Jianyi Liu, et al.
Published: (2020-01-01)
by: Jianyi Liu, et al.
Published: (2020-01-01)
Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors
by: Raz Lapid, et al.
Published: (2024-11-01)
by: Raz Lapid, et al.
Published: (2024-11-01)
A CGAN-based adversarial attack method for data-driven state estimation
by: Qi Wang, et al.
Published: (2025-09-01)
by: Qi Wang, et al.
Published: (2025-09-01)
Trustworthiness of Deep Learning Under Adversarial Attacks in Power Systems
by: Dowens Nicolas, et al.
Published: (2025-05-01)
by: Dowens Nicolas, et al.
Published: (2025-05-01)
A Hybrid Adversarial Attack for Different Application Scenarios
by: Xiaohu Du, et al.
Published: (2020-05-01)
by: Xiaohu Du, et al.
Published: (2020-05-01)
Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model
by: Lamia Alhoraibi, et al.
Published: (2024-09-01)
by: Lamia Alhoraibi, et al.
Published: (2024-09-01)
Adversarial Attacks to Manipulate Target Localization of Object Detector
by: Kai Xu, et al.
Published: (2024-01-01)
by: Kai Xu, et al.
Published: (2024-01-01)
Application of adversarial machine learning in network intrusion detection
by: Qixu LIU, et al.
Published: (2021-11-01)
by: Qixu LIU, et al.
Published: (2021-11-01)
Application of adversarial machine learning in network intrusion detection
by: Qixu LIU, et al.
Published: (2021-11-01)
by: Qixu LIU, et al.
Published: (2021-11-01)
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01)
by: Haoran Lyu, et al.
Published: (2024-03-01)
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography
by: Haiju Fan, et al.
Published: (2025-03-01)
by: Haiju Fan, et al.
Published: (2025-03-01)
Adversarial Example Generation Algorithm Based on Transformer and GAN
by: Shuaiwei LIU, Zhi LI, Guomei WANG, Li ZHANG
Published: (2024-02-01)
by: Shuaiwei LIU, Zhi LI, Guomei WANG, Li ZHANG
Published: (2024-02-01)
Double adversarial attack against license plate recognition system
by: Xianyi CHEN, et al.
Published: (2023-06-01)
by: Xianyi CHEN, et al.
Published: (2023-06-01)
Double adversarial attack against license plate recognition system
by: Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
Published: (2023-06-01)
by: Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
Published: (2023-06-01)
Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy
by: Yu-Ying Chen, et al.
Published: (2021-01-01)
by: Yu-Ying Chen, et al.
Published: (2021-01-01)
Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network
by: Chuan Du, et al.
Published: (2021-10-01)
by: Chuan Du, et al.
Published: (2021-10-01)
Survey of optical-based physical domain adversarial attacks and defense
by: CHEN Jinyin, et al.
Published: (2024-04-01)
by: CHEN Jinyin, et al.
Published: (2024-04-01)
Survey of optical-based physical domain adversarial attacks and defense
by: Jinyin CHEN, Xiaoming ZHAO, Haibin ZHENG, Haifeng GUO
Published: (2024-04-01)
by: Jinyin CHEN, Xiaoming ZHAO, Haibin ZHENG, Haifeng GUO
Published: (2024-04-01)
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by: João Vitorino, et al.
Published: (2022-03-01)
by: João Vitorino, et al.
Published: (2022-03-01)
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
by: Hassan Khazane, et al.
Published: (2024-01-01)
by: Hassan Khazane, et al.
Published: (2024-01-01)
Automated federated learning‐based adversarial attack and defence in industrial control systems
by: Guo‐Qiang Zeng, et al.
Published: (2024-06-01)
by: Guo‐Qiang Zeng, et al.
Published: (2024-06-01)
A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
by: Mohammed Nasser Al-Andoli, et al.
Published: (2024-01-01)
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01)
by: Sanglee Park, et al.
Published: (2020-11-01)
AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems
by: Amira Guesmi, et al.
Published: (2023-11-01)
by: Amira Guesmi, et al.
Published: (2023-11-01)
Similar Items
-
A Defensive Strategy Against Android Adversarial Malware Attacks
by: Fabrice Setephin Atedjio, et al.
Published: (2024-01-01) -
Adversarial Training Methods for Deep Learning: A Systematic Review
by: Weimin Zhao, et al.
Published: (2022-08-01) -
Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation
by: Hiskias Dingeto, et al.
Published: (2023-07-01) -
DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks
by: Fangwei Wang, et al.
Published: (2023-02-01) -
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)
