Research Article
Network Intrusion Detection Method Based on FCWGAN and BiLSTM
Table 1
CWGAN training algorithm.
| ||||||||||||||||||
where , , and respectively denote the network parameters and gradients of the generator and discriminator. |
| ||||||||||||||||||
where , , and respectively denote the network parameters and gradients of the generator and discriminator. |