布谷鸟异构图构建,对比学习
☆11Jun 1, 2022Updated 3 years ago
Alternatives and similar repositories for FewM-HGCL
Users that are interested in FewM-HGCL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆39Aug 2, 2021Updated 4 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- ☆33Oct 18, 2024Updated last year
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆29Feb 3, 2026Updated last month
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- ☆20Jan 20, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A minimalistic framework for Numerical Association Rule Mining☆22Mar 18, 2026Updated last week
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆168Oct 26, 2023Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- A simple cross-platform script for encoding any binary file into a lossless PNG.☆20Aug 12, 2024Updated last year
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- ☆19Aug 10, 2024Updated last year
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- ☆18Mar 15, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- SimCSE中文语义相似度对比学习模型☆91Mar 7, 2022Updated 4 years ago
- Adversarial Robustness for Code☆16Mar 30, 2021Updated 4 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 7 months ago
- Code for the paper "Brain Connectivity based Graph Convolutional Networks for Infant Age Prediction"☆23May 4, 2022Updated 3 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Jan 3, 2022Updated 4 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AnomalyNet: An Anomaly Detection Network for Video Surveillance, IEEE Trans Information Forensics and Security 2019.☆18Dec 26, 2019Updated 6 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- single-cell graph attentional clustering☆13Feb 10, 2022Updated 4 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago