The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021 accepted Paper.
☆18Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for SiamHAN
Users that are interested in SiamHAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Mar 11, 2023Updated 3 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆40Jul 18, 2024Updated last year
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- ☆15Oct 24, 2023Updated 2 years ago
- ☆20Mar 25, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IPv6 Internet Wide Scanning☆28Mar 28, 2025Updated last year
- ☆15Sep 15, 2021Updated 4 years ago
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆20Dec 16, 2021Updated 4 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 3 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆62Jan 7, 2025Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆59Apr 3, 2024Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- IPv6 visualisation based on squarified treemaps☆20Oct 10, 2018Updated 7 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- learn to allocate wireless resources with GNN in over-the-air FL system☆10Jun 4, 2023Updated 2 years ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆21Aug 9, 2023Updated 2 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆132Jan 8, 2025Updated last year
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- Aliyunpan, 小白羊网盘 - Powered by 阿里云盘☆14Jun 7, 2024Updated last year
- ☆62Mar 26, 2026Updated 3 weeks ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago
- heterogeneous graph attention network for SMEs bankruptcy prediction☆13Feb 26, 2021Updated 5 years ago
- A Performance Evaluation Framework for Segment Routing☆19Nov 30, 2022Updated 3 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 8 years ago
- ☆25Mar 11, 2022Updated 4 years ago
- program course for haidian fellowship☆10Apr 15, 2021Updated 5 years ago
- ☆11Oct 18, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- script to analyse data traffic on the Helium network by accessing the blockchain API☆17Aug 31, 2022Updated 3 years ago
- Visual-Text dataset based on NFT metadata☆19Nov 7, 2024Updated last year
- ☆33Oct 14, 2023Updated 2 years ago
- ☆17Feb 20, 2023Updated 3 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago