Abstract
Anomaly Detection (AD) is an important area of research because it helps identify outliers in data, enabling early detection of errors, fraud, and potential security breaches. Machine Learning (ML) can be utilized for distinct AD systems, and Generative Adversarial Networks (GANs) have emerged as a promising technique due to their ability to generate new data that closely resembles a given dataset, allowing for the creation of realistic images, videos, audio, text, and other types of synthetic data. This paper explores state-of-the-art approaches in AD using GANs. The paper starts by providing a comprehensive overview of ML techniques for AD, including supervised, unsupervised, and semi-supervised approaches. This survey also explores various AD approaches based on GANs and provides an application-based classification of GANs-based AD approaches in the Internet-of-Things (IoT), Industrial IoT, Digital Healthcare, Energy Management Systems, and Cellular Network domains. Moreover, the paper discusses several datasets used in evaluating the performance of GANs-based AD techniques such as BOT-IoT, TON-IoT, CIC-IoT, CIC-IDS, and NSL-KDD. These datasets serve as valuable resources for researchers and practitioners to develop and test AD systems, particularly in the context of IoT and network security. Furthermore, the paper discusses the challenges and limitations of GANs-based AD techniques and proposes future research directions to address these challenges.
| Original language | English |
|---|---|
| Article number | 128978 |
| Journal | Expert Systems with Applications |
| Volume | 296 |
| DOIs | |
| Publication status | Published - 10 Jul 2025 |
Keywords
- Anomaly detection
- Deep learning
- Intrusion detection
- Adversarial learning
- artificial intelligence
- GANs
- Artificial intelligence
ASJC Scopus subject areas
- General Engineering
- Computer Science Applications
- Artificial Intelligence
Fingerprint
Dive into the research topics of 'Generative adversarial networks-enabled anomaly detection systems: a survey'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver