Generative Adversarial Networks: A Survey Towards Private and Secure Applications

06/07/2021
by   Zhipeng Cai, et al.
0

Generative Adversarial Networks (GAN) have promoted a variety of applications in computer vision, natural language processing, etc. due to its generative model's compelling ability to generate realistic examples plausibly drawn from an existing distribution of samples. GAN not only provides impressive performance on data generation-based tasks but also stimulates fertilization for privacy and security oriented research because of its game theoretic optimization strategy. Unfortunately, there are no comprehensive surveys on GAN in privacy and security, which motivates this survey paper to summarize those state-of-the-art works systematically. The existing works are classified into proper categories based on privacy and security functions, and this survey paper conducts a comprehensive analysis of their advantages and drawbacks. Considering that GAN in privacy and security is still at a very initial stage and has imposed unique challenges that are yet to be well addressed, this paper also sheds light on some potential privacy and security applications with GAN and elaborates on some future research directions.

READ FULL TEXT
research
03/12/2018

An Introduction to Image Synthesis with Generative Adversarial Nets

There has been a drastic growth of research in Generative Adversarial Ne...
research
02/16/2023

Generative Adversarial Networks for Malware Detection: a Survey

Since their proposal in the 2014 paper by Ian Goodfellow, there has been...
research
06/18/2019

Recent Advances of Image Steganography with Generative Adversarial Networks

In the past few years, the Generative Adversarial Network (GAN) which pr...
research
06/09/2020

A Survey on Generative Adversarial Networks: Variants, Applications, and Training

The Generative Models have gained considerable attention in the field of...
research
08/28/2020

Relational Data Synthesis using Generative Adversarial Networks: A Design Space Exploration

The proliferation of big data has brought an urgent demand for privacy-p...
research
07/14/2019

Steganography using a 3 player game

Image steganography aims to securely embed secret information into cover...
research
12/03/2022

Generating Synthetic Data in a Secure Federated General Adversarial Networks for a Consortium of Health Registries

In this work, we review the architecture design of existing federated Ge...

Please sign up or login with your details

Forgot password? Click here to reset