A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things
☆19Jan 7, 2026Updated 3 months ago
Alternatives and similar repositories for MAML-CNN-FSIDS-IoT
Users that are interested in MAML-CNN-FSIDS-IoT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- Code Repository for "SSL-ProtoNet: Self-supervised Learning Prototypical Networks for few-shot learning"☆28Oct 8, 2024Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆19Jul 8, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- ☆11Feb 24, 2022Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- ☆12Jun 27, 2022Updated 3 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- A Python package for feature selection on a simulated data stream☆10Apr 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Traffic state data imputation☆11Aug 14, 2022Updated 3 years ago
- ☆15Apr 1, 2025Updated last year
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- This repository contains the official implementation of the paper entitled with "FedAPEN: Personalized Cross-silo Federated Learning with…☆14Dec 4, 2023Updated 2 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- PyTorch implementation of Fast-Convergent Federated Learning via Cyclic Aggregation, including FedAvg, FedProx, MOON, and FedRS☆15Jun 28, 2023Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 基于联邦学习和深度残差网络的sdn入侵检测研究☆18Jun 17, 2024Updated last year
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- Code for "Lightweight Blockchain-Empowered Secure and Efficient Federated Edge Learning", IEEE Transactions on Computers☆13Mar 12, 2026Updated last month
- ☆12Apr 7, 2026Updated last week
- A PyTorch implementation of of Anomal-E.☆43Dec 16, 2022Updated 3 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 7 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection (arXiv:2311.08000v2)☆25Nov 22, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Jul 12, 2024Updated last year
- ☆13May 24, 2023Updated 2 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- ☆20Oct 3, 2023Updated 2 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- ☆18May 9, 2024Updated last year