Cybersecurity enhancement using conditional generative adversarial network with transformer-based conditional variational autoencoder

Since, Artificial Intelligence is highly developing and concatenating into several domains, cybersecurity is an important field of delivering both the advantages and disadvantages. In addition to this, Artificial Intelligence is applied in a wide variety of applications like healthcare sector, conte...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Engineering applications of artificial intelligence Ročník 161; s. 112220
Hlavní autoři: Singh, Prithvipal, Singh, Sandeep, Singh, Gurupdesh, Singh, Amritpal
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Ltd 12.12.2025
Témata:
ISSN:0952-1976
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Since, Artificial Intelligence is highly developing and concatenating into several domains, cybersecurity is an important field of delivering both the advantages and disadvantages. In addition to this, Artificial Intelligence is applied in a wide variety of applications like healthcare sector, content creation and entertainment and financial industries. Therefore, this work finds the efficiency of Artificial Intelligence -oriented cybersecurity metrics in succeeding the digital environment over elevating cyber threats. Here, the developed models consist of two different stages while implementing the model. In the first stage, the essential dataset is assembled from the benchmark data source. These datasets are assembled by using Generative Artificial Intelligence (Gen Artificial Intelligence networks). Consequently, the raw data is given as an input to Conditional Hybrid Network for cybersecurity enhancement. Further, the Transformer-based Conditional Variational Autoencoders with Spatial-temporal Attention are designed for feature extraction that is subjected to the Conditional Generative Adversarial Network for classifying the cyber attacks. Henceforth, the developed network is evaluated and designed with multiple measures. Comparing baseline models, the suggested network obtains higher performance for developing security over cyber networks.
AbstractList Since, Artificial Intelligence is highly developing and concatenating into several domains, cybersecurity is an important field of delivering both the advantages and disadvantages. In addition to this, Artificial Intelligence is applied in a wide variety of applications like healthcare sector, content creation and entertainment and financial industries. Therefore, this work finds the efficiency of Artificial Intelligence -oriented cybersecurity metrics in succeeding the digital environment over elevating cyber threats. Here, the developed models consist of two different stages while implementing the model. In the first stage, the essential dataset is assembled from the benchmark data source. These datasets are assembled by using Generative Artificial Intelligence (Gen Artificial Intelligence networks). Consequently, the raw data is given as an input to Conditional Hybrid Network for cybersecurity enhancement. Further, the Transformer-based Conditional Variational Autoencoders with Spatial-temporal Attention are designed for feature extraction that is subjected to the Conditional Generative Adversarial Network for classifying the cyber attacks. Henceforth, the developed network is evaluated and designed with multiple measures. Comparing baseline models, the suggested network obtains higher performance for developing security over cyber networks.
ArticleNumber 112220
Author Singh, Gurupdesh
Singh, Sandeep
Singh, Prithvipal
Singh, Amritpal
Author_xml – sequence: 1
  givenname: Prithvipal
  surname: Singh
  fullname: Singh, Prithvipal
  email: prithvipalsingh89@gmail.com
  organization: Department of Computer Science, Guru Nanak Dev University (GNDU), Amritsar, Punjab, 143005, India
– sequence: 2
  givenname: Sandeep
  surname: Singh
  fullname: Singh, Sandeep
  email: sandeep_feat@sgtuniversity.org
  organization: Department of Computer Science and Engineering, Faculty of Engineering and Technology, SGT University, Gurugram, 122505, Haryana, India
– sequence: 3
  givenname: Gurupdesh
  surname: Singh
  fullname: Singh, Gurupdesh
  email: gurupdeshdhillon@gmail.com
  organization: Department of Computer Science, Guru Nanak Dev University (GNDU), Amritsar, Punjab, 143005, India
– sequence: 4
  givenname: Amritpal
  surname: Singh
  fullname: Singh, Amritpal
  email: amritsinghmand@gmail.com
  organization: Pacific Rim School District, BC, Canada
BookMark eNqFkE1uwjAQhb2gUoH2ClUukHTsJE6ya4X6JyF1064txx6DKdjINiAO0Hs3CLroqqt5Gul7evomZOS8Q0LuKBQUKL9fFegWcruVtmDA6oJSxhiMyBi6muW0a_g1mcS4AoCyrfiYfM-OPYaIahdsOmboltIp3KBL2S5at8iUd9om651cZwt0GGSye8yk3g-YDHZ4O0wHH76yg03LLAXpovFhgyHvZUT9p2F_Ii5Z7pJHp7zGcEOujFxHvL3cKfl8fvqYvebz95e32eM8VyV0KdcVbwywFkzVKgqlplXTt8xw2na1Nk1Xt0jLulK9kRp6XYMpgXGqWMM4k7ycEn7uVcHHGNCIbbAbGY6CgjgJFCvxK1CcBIqzwAF8OIM4rNtbDCIqO4xHbQOqJLS3_1X8AD_LhX0
Cites_doi 10.1016/j.dss.2023.114102
10.1016/j.jnca.2024.103926
10.3389/fnbot.2022.925210
10.1007/s11277-022-09776-x
10.1016/j.jksus.2023.102713
10.58496/MJCS/2023/009
10.1016/j.autcon.2022.104412
10.1057/s42984-020-00007-w
10.1016/j.engappai.2023.105971
10.1109/ACCESS.2020.2968045
10.1007/s10586-024-04355-0
10.1109/ACCESS.2019.2921555
10.1007/s11042-024-18169-0
10.1109/TTS.2023.3280109
10.1016/j.epsr.2022.108603
10.1007/s10462-024-10827-x
10.1109/ACCESS.2022.3185748
10.1016/j.csi.2023.103802
10.1109/TIM.2023.3305655
10.1177/14759217211053776
10.3390/electronics13173393
10.1145/3469379.3469386
10.1109/ACCESS.2024.3465045
10.1007/s10922-022-09659-3
ContentType Journal Article
Copyright 2025
Copyright_xml – notice: 2025
DBID AAYXX
CITATION
DOI 10.1016/j.engappai.2025.112220
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Computer Science
ExternalDocumentID 10_1016_j_engappai_2025_112220
S0952197625022286
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABJNI
ABMAC
ACDAQ
ACGFS
ACLOT
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TN5
~G-
~HD
29G
9DU
AAQXK
AAYXX
ABWVN
ABXDB
ACNNM
ACRPL
ADJOM
ADMUD
ADNMO
AGQPQ
ASPBG
AVWKF
AZFZN
CITATION
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
R2-
SBC
SET
UHS
WUQ
ZMT
ID FETCH-LOGICAL-c309t-d467f0280f48c103d147b82f61895df7958e1354cbfad0bd50f30261c27262a63
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001576742400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0952-1976
IngestDate Sat Nov 29 07:01:43 EST 2025
Sat Nov 22 16:52:57 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Conditional hybrid network
Transformer-based conditional variational AutoEncoder
Conditional generative adversarial network
Generative artificial intelligence
Spatial-temporal attention mechanism
Cybersecurity enhancement
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c309t-d467f0280f48c103d147b82f61895df7958e1354cbfad0bd50f30261c27262a63
OpenAccessLink https://doi.org/10.1016/j.engappai.2025.112220
ParticipantIDs crossref_primary_10_1016_j_engappai_2025_112220
elsevier_sciencedirect_doi_10_1016_j_engappai_2025_112220
PublicationCentury 2000
PublicationDate 2025-12-12
PublicationDateYYYYMMDD 2025-12-12
PublicationDate_xml – month: 12
  year: 2025
  text: 2025-12-12
  day: 12
PublicationDecade 2020
PublicationTitle Engineering applications of artificial intelligence
PublicationYear 2025
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Mohammed (bib27) 2020
Ghillani (bib15) 2022
Stevens (bib32) 2020; 1
Xiang, Liu (bib38) 2020; 15
Cha, Mostafavi, Benipal (bib11) 2023; 121
Kang, Cha (bib18) 2021; 21
Biswas, Mukhopadhyay, Kumar, Delen (bib7) 2024; 177
Cali, Catak, Halden (bib10) 2024; 57
Malatji, Tolah (bib23) 2024
Ali, Tiberti, Marotta, Cassioli (bib4) 2024; 12
Bowman, Howie Huang (bib8) 2021; 55
Aceto, Giampaolo, Guida, Izzo, Pescapè, Piccialli, Prezioso (bib1) 2024; 229
Jasmine Hephzibah, Reddy Vallem, Sahaya Sheela, Dhanalakshmi (bib17) 2023
Yampolskiy, Spellchecker (bib39) 2016
Zeadally, Adi, Baig, Khan (bib41) 2020; 8
Wang, Sharifnia, Gao, Tindemans, Palensky (bib36) 2022
Ahmad Najar, Manohar Naik (bib2) 2024; 139
Avci, Tekinerdogan, Catal (bib6) 2024
Ali, Cha (bib3) 2022; 141
Calderon (bib9) 2019
Sharma, Shankar Prasad, Shaheen, Ahamed (bib30) 2024; 83
Li, Zhang, Wang, Wu, Yang (bib21) 2022; 16
Sood, Prakash, Sharma, Singh, Choubey (bib31) 2022
Wirkuttis, Klein (bib37) 2017; vol. 1
Li (bib20) 2024
Ganguli, Kumar Shandilya, Izonin (bib14) 2023; 35
Li, Qiang, Ma (bib22) 2024
Khurram Hassan, Ibrahim (bib19) 2023; 7
Tolulope Familoni (bib33) 2024; 5
Emre Seyyar, Yavuz, Ünver (bib13) 2022; 10
Han, Yun, Park (bib16) 2024; 13
Vaddadi, Vallabhaneni, Whig (bib34) 2023; AI
Zhao, Wu, Ma, Pan (bib42) 2023; 72
Wang, Yin (bib35) 2019; 7
Yenduri, Reddy Gadekallu (bib40) 2022
Mittu, Lawless (bib26) 2015
Pranav Patil (bib28) 2016; 4
Chel, Zhang, Zhu, Qu, Jin (bib12) 2021
Reddy Maddireddy (bib29) 2020; 1
Aloqaily, Kanhere, Bellavista, Nogueira (bib5) 2022; 30
Meenakshi, Karunkuzhali (bib24) 2024; 88
Michael, Abbas, George (bib25) 2023; 4
Cali (10.1016/j.engappai.2025.112220_bib10) 2024; 57
Sood (10.1016/j.engappai.2025.112220_bib31) 2022
Ahmad Najar (10.1016/j.engappai.2025.112220_bib2) 2024; 139
Biswas (10.1016/j.engappai.2025.112220_bib7) 2024; 177
Han (10.1016/j.engappai.2025.112220_bib16) 2024; 13
Ali (10.1016/j.engappai.2025.112220_bib3) 2022; 141
Emre Seyyar (10.1016/j.engappai.2025.112220_bib13) 2022; 10
Khurram Hassan (10.1016/j.engappai.2025.112220_bib19) 2023; 7
Avci (10.1016/j.engappai.2025.112220_bib6) 2024
Mohammed (10.1016/j.engappai.2025.112220_bib27) 2020
Ganguli (10.1016/j.engappai.2025.112220_bib14) 2023; 35
Wang (10.1016/j.engappai.2025.112220_bib36) 2022
Reddy Maddireddy (10.1016/j.engappai.2025.112220_bib29) 2020; 1
Yampolskiy (10.1016/j.engappai.2025.112220_bib39) 2016
Zhao (10.1016/j.engappai.2025.112220_bib42) 2023; 72
Calderon (10.1016/j.engappai.2025.112220_bib9) 2019
Li (10.1016/j.engappai.2025.112220_bib20) 2024
Meenakshi (10.1016/j.engappai.2025.112220_bib24) 2024; 88
Michael (10.1016/j.engappai.2025.112220_bib25) 2023; 4
Kang (10.1016/j.engappai.2025.112220_bib18) 2021; 21
Wang (10.1016/j.engappai.2025.112220_bib35) 2019; 7
Xiang (10.1016/j.engappai.2025.112220_bib38) 2020; 15
Aceto (10.1016/j.engappai.2025.112220_bib1) 2024; 229
Chel (10.1016/j.engappai.2025.112220_bib12) 2021
Malatji (10.1016/j.engappai.2025.112220_bib23) 2024
Mittu (10.1016/j.engappai.2025.112220_bib26) 2015
Li (10.1016/j.engappai.2025.112220_bib21) 2022; 16
Bowman (10.1016/j.engappai.2025.112220_bib8) 2021; 55
Stevens (10.1016/j.engappai.2025.112220_bib32) 2020; 1
Ali (10.1016/j.engappai.2025.112220_bib4) 2024; 12
Pranav Patil (10.1016/j.engappai.2025.112220_bib28) 2016; 4
Zeadally (10.1016/j.engappai.2025.112220_bib41) 2020; 8
Vaddadi (10.1016/j.engappai.2025.112220_bib34) 2023; AI
Jasmine Hephzibah (10.1016/j.engappai.2025.112220_bib17) 2023
Yenduri (10.1016/j.engappai.2025.112220_bib40) 2022
Li (10.1016/j.engappai.2025.112220_bib22) 2024
Aloqaily (10.1016/j.engappai.2025.112220_bib5) 2022; 30
Wirkuttis (10.1016/j.engappai.2025.112220_bib37) 2017; vol. 1
Cha (10.1016/j.engappai.2025.112220_bib11) 2023; 121
Ghillani (10.1016/j.engappai.2025.112220_bib15) 2022
Sharma (10.1016/j.engappai.2025.112220_bib30) 2024; 83
Tolulope Familoni (10.1016/j.engappai.2025.112220_bib33) 2024; 5
References_xml – volume: 30
  year: 2022
  ident: bib5
  article-title: Special issue on cybersecurity management in the era of AI
  publication-title: J. Netw. Syst. Manag.
– volume: 141
  year: 2022
  ident: bib3
  article-title: Attention-based generative adversarial network with internal damage segmentation using thermography
  publication-title: Autom. ConStruct.
– year: 2024
  ident: bib6
  article-title: "Design tactics for tailoring transformer architectures to cybersecurity challenges"
  publication-title: Clust. Comput.
– volume: 83
  start-page: 66757
  year: 2024
  end-page: 66773
  ident: bib30
  article-title: An efficient cyber threat prediction using a novel artificial intelligence technique
  publication-title: Multimed. Tool. Appl.
– start-page: 129
  year: 2022
  end-page: 143
  ident: bib40
  article-title: Recent advancements in network and cyber security using RNN
  publication-title: Trust, Security, and Privacy for Big Data
– year: 2020
  ident: bib27
  article-title: Artificial intelligence for cybersecurity: a systematic mapping of literature
  publication-title: A Systematic Mapping of Literature
– volume: 72
  year: 2023
  ident: bib42
  article-title: Spatial and temporal attention-enabled transformer network for multivariate short-term residential load forecasting
  publication-title: IEEE Trans. Instrum. Meas.
– volume: 55
  year: 2021
  ident: bib8
  article-title: Towards next-generation cybersecurity with graph AI
  publication-title: ACM SIGOPS - Oper. Syst. Rev.
– volume: 1
  start-page: 164
  year: 2020
  end-page: 170
  ident: bib32
  article-title: Knowledge in the grey zone: AI and cybersecurity
  publication-title: Digital War
– volume: 16
  year: 2022
  ident: bib21
  article-title: Spatial-temporal attention mechanism and graph convolutional networks for destination prediction
  publication-title: Front. Neurorob.
– year: 2021
  ident: bib12
  article-title: Constrained transformer network for ECG signal processing and arrhythmia classification
  publication-title: BMC Med. Inf. Decis. Making
– volume: 15
  year: 2020
  ident: bib38
  article-title: A multi-Faceted approach for trustworthy AI in cybersecurity
  publication-title: J. Strategic Innov. Sustain.
– year: 2015
  ident: bib26
  article-title: "Human factors in cybersecurity and the role for AI", AI
  publication-title: AAAI Spring Symposium Series
– year: 2024
  ident: bib23
  article-title: Artificial Intelligence (AI) Cybersecurity Dimensions: a Comprehensive Framework for Understanding Adversarial and Offensive AI
– year: 2022
  ident: bib15
  article-title: Deep learning and artificial intelligence framework to improve the cyber security
  publication-title: Am. J. Artif. Intell.
– volume: 5
  year: 2024
  ident: bib33
  article-title: "Cybersecurity challenges in the age of ai: theoretical approaches and practical solutions"
  publication-title: Comput. Sci. IT Res. J.
– start-page: 737
  year: 2024
  end-page: 741
  ident: bib22
  article-title: Advancing cybersecurity: graph neural networks in threat intelligence knowledge graphs
  publication-title: ACM Other Conferences
– volume: vol. 1
  year: 2017
  ident: bib37
  article-title: Artificial intelligence in cybersecurity
  publication-title: Cyber, Intelligence, and Security
– volume: 88
  year: 2024
  ident: bib24
  article-title: Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network
  publication-title: Comput. Stand. Interfac.
– volume: 7
  year: 2023
  ident: bib19
  article-title: The role of artificial intelligence in cyber security and incident response
  publication-title: Int. J. Electron. Crime Invest.
– volume: 4
  start-page: 1
  year: 2016
  end-page: 5
  ident: bib28
  article-title: " artificial intelligence in cybersecurity "
  publication-title: Int. J. Res. Comput. Appl. Robot.
– volume: 8
  start-page: 23817
  year: 2020
  end-page: 23837
  ident: bib41
  article-title: Harnessing artificial intelligence capabilities to improve cybersecurity
  publication-title: IEEE Access
– volume: 4
  start-page: 104
  year: 2023
  end-page: 109
  ident: bib25
  article-title: AI in cybersecurity: the paradox
  publication-title: IEEE Trans. Technol. Soc.
– volume: 7
  start-page: 77981
  year: 2019
  end-page: 77989
  ident: bib35
  article-title: Securing data with Blockchain and AI
  publication-title: IEEE Access
– volume: 229
  year: 2024
  ident: bib1
  article-title: Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems
  publication-title: J. Netw. Comput. Appl.
– volume: 139
  year: 2024
  ident: bib2
  article-title: Cyber-secure SDN: a CNN-based approach for efficient detection and mitigation of DDoS attacks
  publication-title: Comput. Secur.
– volume: 57
  year: 2024
  ident: bib10
  article-title: Trustworthy cyber-physical power systems using AI: dueling algorithms for PMU anomaly detection and cybersecurity
  publication-title: Artif. Intell. Rev.
– volume: 13
  start-page: 3393
  year: 2024
  ident: bib16
  article-title: Deep learning for cybersecurity classification: utilizing depth-wise CNN and attention mechanism on VM-obfuscated data
  publication-title: Electronics
– start-page: 48
  year: 2023
  end-page: 56
  ident: bib17
  article-title: An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
  publication-title: Mesopotamian J. Cybersec.
– volume: AI
  start-page: 1
  year: 2023
  end-page: 8
  ident: bib34
  article-title: Utilizing AI and machine learning in cybersecurity for sustainable development through enhanced threat detection and mitigation
  publication-title: Int. J. Sustain. Dev.
– year: 2022
  ident: bib36
  article-title: Generating multivariate load states using a conditional variational Autoencoder
  publication-title: Elec. Power Syst. Res.
– volume: 177
  year: 2024
  ident: bib7
  article-title: A hybrid framework using explainable AI (XAI) in cyber-risk management for defense and recovery against phishing attacks
  publication-title: Decis. Support Syst.
– volume: 21
  year: 2021
  ident: bib18
  article-title: Efficient attention-based deep encoder and decoder for automatic crack segmentation
  publication-title: Struct. Health Monit.
– volume: 1
  year: 2020
  ident: bib29
  article-title: AI and big data: synergizing to create robust cybersecurity ecosystems for future networks
  publication-title: Int. J. Adv. Eng. Technol. Innov.
– year: 2022
  ident: bib31
  article-title: Intrusion detection system in wireless sensor network using conditional generative adversarial network
  publication-title: Wirel. Pers. Commun.
– start-page: 81
  year: 2024
  end-page: 86
  ident: bib20
  article-title: Optimization and Performance Evaluation of Network Intrusion Detection and Prevention Technology Based on Attention Mechanism
– volume: 35
  year: 2023
  ident: bib14
  article-title: Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature-inspired cyber security
  publication-title: J. King Saud Univ. Sci.
– year: 2019
  ident: bib9
  article-title: The benefits of artificial intelligence in cybersecurity
  publication-title: Econom. Crime Forensics Capstones
– year: 2016
  ident: bib39
  article-title: Artificial intelligence safety and cybersecurity: a timeline of AI failures
  publication-title: Artif. Intell.
– volume: 12
  start-page: 137618
  year: 2024
  end-page: 137633
  ident: bib4
  article-title: Empowering network security: BERT transformer learning approach and MLP for intrusion detection in imbalanced network traffic
  publication-title: IEEE Access
– volume: 121
  year: 2023
  ident: bib11
  article-title: DNoiseNet: deep learning-based feedback active noise control in various noisy environments
  publication-title: Eng. Appl. Artif. Intell.
– volume: 10
  start-page: 68633
  year: 2022
  end-page: 68644
  ident: bib13
  article-title: An attack detection framework based on BERT and deep learning
  publication-title: IEEE Access
– year: 2019
  ident: 10.1016/j.engappai.2025.112220_bib9
  article-title: The benefits of artificial intelligence in cybersecurity
  publication-title: Econom. Crime Forensics Capstones
– volume: vol. 1
  year: 2017
  ident: 10.1016/j.engappai.2025.112220_bib37
  article-title: Artificial intelligence in cybersecurity
– volume: 177
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib7
  article-title: A hybrid framework using explainable AI (XAI) in cyber-risk management for defense and recovery against phishing attacks
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2023.114102
– year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib15
  article-title: Deep learning and artificial intelligence framework to improve the cyber security
  publication-title: Am. J. Artif. Intell.
– volume: 229
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib1
  article-title: Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2024.103926
– volume: 16
  year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib21
  article-title: Spatial-temporal attention mechanism and graph convolutional networks for destination prediction
  publication-title: Front. Neurorob.
  doi: 10.3389/fnbot.2022.925210
– year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib31
  article-title: Intrusion detection system in wireless sensor network using conditional generative adversarial network
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-022-09776-x
– volume: AI
  start-page: 1
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib34
  article-title: Utilizing AI and machine learning in cybersecurity for sustainable development through enhanced threat detection and mitigation
  publication-title: Int. J. Sustain. Dev.
– volume: 35
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib14
  article-title: Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature-inspired cyber security
  publication-title: J. King Saud Univ. Sci.
  doi: 10.1016/j.jksus.2023.102713
– start-page: 48
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib17
  article-title: An efficient cyber security system based on flow-based anomaly detection using Artificial neural network
  publication-title: Mesopotamian J. Cybersec.
  doi: 10.58496/MJCS/2023/009
– volume: 141
  year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib3
  article-title: Attention-based generative adversarial network with internal damage segmentation using thermography
  publication-title: Autom. ConStruct.
  doi: 10.1016/j.autcon.2022.104412
– volume: 1
  start-page: 164
  year: 2020
  ident: 10.1016/j.engappai.2025.112220_bib32
  article-title: Knowledge in the grey zone: AI and cybersecurity
  publication-title: Digital War
  doi: 10.1057/s42984-020-00007-w
– year: 2021
  ident: 10.1016/j.engappai.2025.112220_bib12
  article-title: Constrained transformer network for ECG signal processing and arrhythmia classification
  publication-title: BMC Med. Inf. Decis. Making
– volume: 121
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib11
  article-title: DNoiseNet: deep learning-based feedback active noise control in various noisy environments
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2023.105971
– start-page: 81
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib20
– year: 2016
  ident: 10.1016/j.engappai.2025.112220_bib39
  article-title: Artificial intelligence safety and cybersecurity: a timeline of AI failures
  publication-title: Artif. Intell.
– volume: 8
  start-page: 23817
  year: 2020
  ident: 10.1016/j.engappai.2025.112220_bib41
  article-title: Harnessing artificial intelligence capabilities to improve cybersecurity
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2968045
– volume: 139
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib2
  article-title: Cyber-secure SDN: a CNN-based approach for efficient detection and mitigation of DDoS attacks
  publication-title: Comput. Secur.
– year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib6
  article-title: "Design tactics for tailoring transformer architectures to cybersecurity challenges"
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-024-04355-0
– start-page: 737
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib22
  article-title: Advancing cybersecurity: graph neural networks in threat intelligence knowledge graphs
– year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib23
– volume: 7
  start-page: 77981
  year: 2019
  ident: 10.1016/j.engappai.2025.112220_bib35
  article-title: Securing data with Blockchain and AI
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2921555
– volume: 83
  start-page: 66757
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib30
  article-title: An efficient cyber threat prediction using a novel artificial intelligence technique
  publication-title: Multimed. Tool. Appl.
  doi: 10.1007/s11042-024-18169-0
– volume: 4
  start-page: 104
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib25
  article-title: AI in cybersecurity: the paradox
  publication-title: IEEE Trans. Technol. Soc.
  doi: 10.1109/TTS.2023.3280109
– year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib36
  article-title: Generating multivariate load states using a conditional variational Autoencoder
  publication-title: Elec. Power Syst. Res.
  doi: 10.1016/j.epsr.2022.108603
– volume: 4
  start-page: 1
  year: 2016
  ident: 10.1016/j.engappai.2025.112220_bib28
  article-title: " artificial intelligence in cybersecurity "
  publication-title: Int. J. Res. Comput. Appl. Robot.
– volume: 57
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib10
  article-title: Trustworthy cyber-physical power systems using AI: dueling algorithms for PMU anomaly detection and cybersecurity
  publication-title: Artif. Intell. Rev.
  doi: 10.1007/s10462-024-10827-x
– volume: 7
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib19
  article-title: The role of artificial intelligence in cyber security and incident response
  publication-title: Int. J. Electron. Crime Invest.
– volume: 1
  year: 2020
  ident: 10.1016/j.engappai.2025.112220_bib29
  article-title: AI and big data: synergizing to create robust cybersecurity ecosystems for future networks
  publication-title: Int. J. Adv. Eng. Technol. Innov.
– volume: 5
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib33
  article-title: "Cybersecurity challenges in the age of ai: theoretical approaches and practical solutions"
  publication-title: Comput. Sci. IT Res. J.
– volume: 10
  start-page: 68633
  year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib13
  article-title: An attack detection framework based on BERT and deep learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3185748
– volume: 88
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib24
  article-title: Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network
  publication-title: Comput. Stand. Interfac.
  doi: 10.1016/j.csi.2023.103802
– volume: 72
  year: 2023
  ident: 10.1016/j.engappai.2025.112220_bib42
  article-title: Spatial and temporal attention-enabled transformer network for multivariate short-term residential load forecasting
  publication-title: IEEE Trans. Instrum. Meas.
  doi: 10.1109/TIM.2023.3305655
– volume: 21
  issue: 5
  year: 2021
  ident: 10.1016/j.engappai.2025.112220_bib18
  article-title: Efficient attention-based deep encoder and decoder for automatic crack segmentation
  publication-title: Struct. Health Monit.
  doi: 10.1177/14759217211053776
– volume: 15
  year: 2020
  ident: 10.1016/j.engappai.2025.112220_bib38
  article-title: A multi-Faceted approach for trustworthy AI in cybersecurity
  publication-title: J. Strategic Innov. Sustain.
– volume: 13
  start-page: 3393
  issue: 17
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib16
  article-title: Deep learning for cybersecurity classification: utilizing depth-wise CNN and attention mechanism on VM-obfuscated data
  publication-title: Electronics
  doi: 10.3390/electronics13173393
– year: 2015
  ident: 10.1016/j.engappai.2025.112220_bib26
  article-title: "Human factors in cybersecurity and the role for AI", AI
– volume: 55
  year: 2021
  ident: 10.1016/j.engappai.2025.112220_bib8
  article-title: Towards next-generation cybersecurity with graph AI
  publication-title: ACM SIGOPS - Oper. Syst. Rev.
  doi: 10.1145/3469379.3469386
– start-page: 129
  year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib40
  article-title: Recent advancements in network and cyber security using RNN
– volume: 12
  start-page: 137618
  year: 2024
  ident: 10.1016/j.engappai.2025.112220_bib4
  article-title: Empowering network security: BERT transformer learning approach and MLP for intrusion detection in imbalanced network traffic
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3465045
– year: 2020
  ident: 10.1016/j.engappai.2025.112220_bib27
  article-title: Artificial intelligence for cybersecurity: a systematic mapping of literature
– volume: 30
  year: 2022
  ident: 10.1016/j.engappai.2025.112220_bib5
  article-title: Special issue on cybersecurity management in the era of AI
  publication-title: J. Netw. Syst. Manag.
  doi: 10.1007/s10922-022-09659-3
SSID ssj0003846
Score 2.443416
Snippet Since, Artificial Intelligence is highly developing and concatenating into several domains, cybersecurity is an important field of delivering both the...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 112220
SubjectTerms Conditional generative adversarial network
Conditional hybrid network
Cybersecurity enhancement
Generative artificial intelligence
Spatial-temporal attention mechanism
Transformer-based conditional variational AutoEncoder
Title Cybersecurity enhancement using conditional generative adversarial network with transformer-based conditional variational autoencoder
URI https://dx.doi.org/10.1016/j.engappai.2025.112220
Volume 161
WOSCitedRecordID wos001576742400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 0952-1976
  databaseCode: AIEXJ
  dateStart: 19950201
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0003846
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9wwEBbbpIde-i5NX-jQW3BqS35IxyWkr0MoJIW9GdmWsxtSx3jXS_oD-nf6GztjSbYXB9pSyoIxY2v8mG89o9E8CHkLJn3JMx15ZRgwnKBI-Evp2AuEAn0ZxkAWXbOJ5PRULBbyy2z20-XCbK-SqhI3N7L-r6IGGggbU2f_Qtw9UyDAPggdtiB22P6R4I-_Z2DS2bZ0h7paoly7Jf_WZtjiKrXxAF50Rae76CGFnZnXqmviUZnYcOukdaatbjzUecUOhy2OsPuq3VxjXczCRvw6h_9Q8vBwvF7ehSA0XaxS1zlkVBy09_vAGOP3gYdZble1upocOkM3uK4n9A9t09aFXi8nR-bfgJtjZT0eLMLokWCYH_epOEPck_FnwlnSNJPpP-2m0PtETRiPxeWRri7gudXqCC-D2VSM-YNi7MMVz5A58gZ7ET1m8R2yz5JIwld0f_7pZPG51_1cmNQwdzOjnPTbr3a7OTQycc4fkvt2bkLnBlOPyExXj8kDO0-hVgusgeRagTjaE_JjB3V0hDraoY6OMEMH1NER6qhFHUXU0QnqdjiMUEdHqHtKvr4_OT_-6NkOH17OfbnxClDTJS7ul6HIA58XQZhkgpVxIGRUlImMhA54FOZZqQo_KyK_5Og0yFnCYqZi_ozsVdeVfk6olCKPo0jlActCruAXFmB4cck5KLEkOSDv3ItOa1PIJXURjpepE02KokmNaA6IdPJIrTlqzMwUYPSbsS_-YexLcm9A_Suyt2la_Zrczbeb1bp5YxH3C3S-vk0
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybersecurity+enhancement+using+conditional+generative+adversarial+network+with+transformer-based+conditional+variational+autoencoder&rft.jtitle=Engineering+applications+of+artificial+intelligence&rft.au=Singh%2C+Prithvipal&rft.au=Singh%2C+Sandeep&rft.au=Singh%2C+Gurupdesh&rft.au=Singh%2C+Amritpal&rft.date=2025-12-12&rft.pub=Elsevier+Ltd&rft.issn=0952-1976&rft.volume=161&rft_id=info:doi/10.1016%2Fj.engappai.2025.112220&rft.externalDocID=S0952197625022286
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0952-1976&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0952-1976&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0952-1976&client=summon