ChrisFugl / Intrusing-Detection-System-AttackLinks
Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is normal traffic.
☆79Updated 2 years ago
Alternatives and similar repositories for Intrusing-Detection-System-Attack
Users that are interested in Intrusing-Detection-System-Attack are comparing it to the libraries listed below
Sorting:
- Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.☆66Updated 3 years ago
- Practical Detection of Trojan Neural Networks☆121Updated 5 years ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆97Updated last year
- ☆29Updated 9 months ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆67Updated 2 months ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆43Updated last year
- PhishIntention: Phishing detection through webpage intention☆253Updated 3 months ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆57Updated last year
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆27Updated 5 years ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆36Updated last year
- CVPR 2022 Workshop Robust Classification☆79Updated 3 years ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆64Updated 3 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Updated 4 years ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack(TPAMI 2025)☆42Updated 3 months ago
- ☆16Updated last year
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆137Updated 5 months ago
- ☆18Updated last year
- ☆82Updated 6 months ago
- [INFOCOM 2024 Top 1 Popular Article] Agglomerative Federated Learning: Empowering Larger Model Training via End-Edge-Cloud Collaboration☆74Updated 11 months ago
- ☆58Updated 2 years ago
- 🔥[MobiCom'25 Poster] AFL-Lib: An Asynchronous Federated Learning Library and Benchmark☆30Updated 4 months ago
- use sklearn to detect two types of network attacks☆34Updated 6 years ago
- code for ICLR 2024 paper MG-TSD: Multi-Granularity Time Series Diffusion Models with Guided Learning Process☆40Updated last year
- Sequential data using RNN (LSTM, GRU, etc) CNN and RCNN. Adaptable to variable length input sequence.☆64Updated 2 years ago
- windows kernel event log collect☆120Updated last month
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆32Updated last year
- ACL 2025 (Main) HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States☆151Updated 6 months ago
- To provide the stego community with C/C++ implementations of selected feature extractors mainly targeted at H.264 steganography.☆73Updated 4 years ago
- Implementation of the Knowledge Transferable Graph Neural Network (KTGNN), published on WWW2023☆51Updated 2 years ago
- ☆36Updated 5 years ago