A data balancing approach based on generative adversarial network

L Yuan, S Yu, Z Yang, M Duan, K Li - Future Generation Computer Systems, 2023 - Elsevier
Intrusion detection is an effective means of ensuring the proper functioning of industrial
control systems (ICSs). Most intrusion detection algorithms learn the historical ICS data to …

Incentive mechanism design toward a win–win situation for generative art trainers and artists

H Duan, A El Saddik, W Cai - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The recent development of generative art, a typical category of artificial intelligence-
generated content (AIGC), is essentially beneficial for social good, which can help amateurs …

A novel anomaly detection method for digital twin data using deconvolution operation with attention mechanism

Z Li, M Duan, B Xiao, S Yang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
In recent years, industrial control systems have evolved toward stability and efficiency,
increasing industrial control systems interconnected with the Internet, which means that …

Dual attention adversarial attacks with limited perturbations

M Duan, Y Qin, J Deng, K Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The construction of undetectable adversarial examples with few perturbances remains a
difficult problem in adversarial attacks. At present, most solutions use the standard gradient …

Adaptive federated few-shot feature learning with prototype rectification

M Yang, X Chu, J Zhu, Y Xi, S Niu, Z Wang - Engineering Applications of …, 2023 - Elsevier
Targeting to produce new features from limited data, few-shot feature generation
approaches have attracted extensive attention and successfully mitigated the high cost of …

BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack

Y Ren, M Hu, Z Yang, G Feng, X Zhang - Information Sciences, 2024 - Elsevier
In federated learning (FL), multiple clients use local datasets to train models and submit
local gradients to the server for aggregation. However, malicious clients may compromise …

Setti: As elf-supervised adv e rsarial malware de t ection archi t ecture in an i ot environment

M Golmaryami, R Taheri, Z Pooranian… - ACM Transactions on …, 2022 - dl.acm.org
In recent years, malware detection has become an active research topic in the area of
Internet of Things (IoT) security. The principle is to exploit knowledge from large quantities of …

Exploring the effect of high-frequency components in gans training

Z Li, P Xia, X Rui, B Li - ACM Transactions on Multimedia Computing …, 2023 - dl.acm.org
Generative Adversarial Networks (GANs) have the ability to generate images that are
visually indistinguishable from real images. However, recent studies have revealed that …

RRA-FFSCIL: Inter-intra classes representation and relationship augmentation federated few-shot incremental learning

Y Jiang, Y Cheng, D Wang, B Song - Neurocomputing, 2024 - Elsevier
Federated learning (FL), as a distributed machine learning paradigm, enables on-device
model training and inference without data updates or privacy breaches, promoting edge …

MC-Net: Realistic Sample Generation for Black-Box Attacks

M Duan, K Jiao, S Yu, Z Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
One area of current research on adversarial attacks is how to generate plausible adversarial
examples when only a small number of datasets are available. Current adversarial attack …