Jieerbobo / TrustGuardView external linksLinks
Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"
☆25Sep 14, 2024Updated last year
Alternatives and similar repositories for TrustGuard
Users that are interested in TrustGuard are comparing it to the libraries listed below
Sorting:
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- STHN: Simplifying Temporal Heterogeneous Network for Continuous-Time Link Prediction [CIKM 2023]☆11Oct 30, 2023Updated 2 years ago
- e-Health Record management system using Blockchain and IPFS☆11Sep 13, 2020Updated 5 years ago
- Open Knowledge Enrichment for Long-tail Entities, WWW 2020☆14Jun 17, 2022Updated 3 years ago
- A Deep Reinforcement Learning Approach For Software-Defined Networking Routing Optimisation☆13Nov 12, 2024Updated last year
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- [CIKM2023] HyperFormer: Enhancing Entity and Relation Interaction for Hyper-Relational Knowledge Graph Completion☆15Nov 26, 2024Updated last year
- CP-ABE-Blockchain experiments☆16Jul 4, 2024Updated last year
- ☆13Oct 18, 2019Updated 6 years ago
- ☆16Jul 16, 2020Updated 5 years ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Contextual knowledge bases☆24Jun 30, 2022Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Jun 15, 2020Updated 5 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- The repository for the paper Reasoning On Knowledge Graphs With Debate Dynamics☆21Mar 24, 2023Updated 2 years ago
- Fabric & ABE based copy-right system.☆21Jun 17, 2022Updated 3 years ago
- Code and data for EACL 2024 paper "Contextualization Distillation from Large Language Models for Knowledge Graph Completion"☆24Oct 17, 2024Updated last year
- File sharing among users using IPFS and Ethereum Blockchain☆20Mar 18, 2023Updated 2 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- ☆33Feb 27, 2023Updated 2 years ago
- IEEE Transactions on Affective Computing 2023☆28Jan 28, 2024Updated 2 years ago
- [Paper][COLING2022] Ruleformer: Context-aware Rule Mining over Knowledge Graph☆26Nov 30, 2022Updated 3 years ago
- This repository describes the demonstration of encrypted network traffic classification in SDN environment. A testbed is created using Mi…☆24Nov 17, 2022Updated 3 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- ☆38Jun 11, 2023Updated 2 years ago
- ☆52Aug 5, 2022Updated 3 years ago
- Knowledge Graph summarization for anomaly/error detection & completion (WebConf '20)☆38Jun 12, 2020Updated 5 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Sep 27, 2018Updated 7 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆191Sep 8, 2021Updated 4 years ago
- A Hyperledger Fabric Based Access Control system to mediate access control flow from centralized applications.☆47Apr 13, 2022Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- This is the official impletation repository of NAACL findings paper, GenTKG: Generative Forecasting on Temporal Knowledge Graph with Larg…☆61Oct 27, 2025Updated 3 months ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆52Aug 10, 2023Updated 2 years ago