1. Kos , J. , Fischer , I. , & Song , D. (2018, May ). Adversarial examples for generative models. In 2018 ieee security and privacy workshops (spw) (pp. 36-42) . IEEE. Kos, J., Fischer, I., & Song, D. (2018, May). Adversarial examples for generative models. In 2018 ieee security and privacy workshops (spw) (pp. 36-42). IEEE.
2. Yang , G. , Yu , S. , Dong , H. , Slabaugh , G. , Dragotti , P. L. , Ye , X. , ... & Firmin , D. ( 2017 ). DAGAN: deep de-aliasing generative adversarial networks for fast compressed sensing MRI reconstruction . IEEE transactions on medical imaging, 37(6), 1310-1321. Yang, G., Yu, S., Dong, H., Slabaugh, G., Dragotti, P. L., Ye, X., ... & Firmin, D. (2017). DAGAN: deep de-aliasing generative adversarial networks for fast compressed sensing MRI reconstruction. IEEE transactions on medical imaging, 37(6), 1310-1321.
3. Cascading failure and recovery of spatially interdependent networks
4. Shang , J. , Huang , Y. , Meng , Y. , He , N. , & Chen , W. ( 2003 ). Network information security solution for electricity. Automation of Electric Power Systems . Shang, J., Huang, Y., Meng, Y., He, N., & Chen, W. (2003). Network information security solution for electricity. Automation of Electric Power Systems.
5. Randhawa , R. H. , Aslam , N. , Alauthman , M. , Rafiq , H. , & Comeau , F. ( 2021 ). Security hardening of botnet detectors using generative adversarial networks . IEEE Access , PP (99), 1-1. Randhawa, R. H., Aslam, N., Alauthman, M., Rafiq, H., & Comeau, F. (2021). Security hardening of botnet detectors using generative adversarial networks. IEEE Access, PP (99), 1-1.