☆23Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for CPS-papers
Users that are interested in CPS-papers are comparing it to the libraries listed below
Sorting:
- ☆12Jan 11, 2025Updated last year
- Deadline countdowns for academic conferences relevant to the SSE chair.☆12Feb 10, 2026Updated 3 weeks ago
- My modular neovim configuration (deprecated)☆11Feb 16, 2023Updated 3 years ago
- Software-Defined GPS Signal Simulator☆15Aug 21, 2018Updated 7 years ago
- EECS 568 - Mobile Robotics Final Project☆11May 12, 2019Updated 6 years ago
- 基于openCV的颜色识别并提取面积☆12May 15, 2021Updated 4 years ago
- RTSA-API-Samples☆13Jun 4, 2025Updated 9 months ago
- 5G network slicing with CP/UP split☆16Nov 18, 2022Updated 3 years ago
- GPS multipath simulation in Gazebo☆14Jul 12, 2023Updated 2 years ago
- Artifact of TOSEM accepted paper: "Try with Simpler - An Evaluation of Improved PCA in Log-based Anomaly Detection."☆13Dec 31, 2022Updated 3 years ago
- Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Softwar…☆10Sep 29, 2022Updated 3 years ago
- Repository that contains the code for the paper titled, 'Unifying Distillation with Personalization in Federated Learning'.☆13May 31, 2021Updated 4 years ago
- ☆13Mar 7, 2022Updated 3 years ago
- fileshare is a self hosted cloud-disk-like, grpc-based file server☆26Jun 28, 2025Updated 8 months ago
- ☆12Jul 13, 2018Updated 7 years ago
- ☆14Jun 6, 2024Updated last year
- A black-box fuzzing framework for the Intent-Based Networking (IBN)☆15Aug 14, 2023Updated 2 years ago
- Detect common mistakes in academic papers☆61Mar 1, 2019Updated 7 years ago
- ☆17Jan 17, 2024Updated 2 years ago
- ☆14Oct 26, 2022Updated 3 years ago
- ☆15May 23, 2025Updated 9 months ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 9 months ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- ☆12Nov 30, 2018Updated 7 years ago
- Lightweight framework for learning with side information (aka privileged information), based on Theano and Lasagne. For more info on lear…☆18Jul 12, 2016Updated 9 years ago
- ☆15Sep 6, 2021Updated 4 years ago
- ☆14Nov 3, 2023Updated 2 years ago
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- FAST-UAV: an open-source framework for optimal drone design with a multidisciplinary approach☆24Nov 10, 2025Updated 3 months ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated last year
- Framework for Crowd-sourced Machine Learning☆16Jul 3, 2017Updated 8 years ago
- Sample Configurations and Miscellaneous for Mobile Network☆22Feb 20, 2026Updated last week
- Supplementary Material "Co-Design Optimisation of Morphing Topology and Control of Winged Drones" published in IEEE 2024 International Co…☆19Nov 22, 2024Updated last year
- A ROS package achieves drone object tracking based on vision.☆17Apr 20, 2021Updated 4 years ago
- Demo of the TrustworthySearch API☆19Jun 11, 2021Updated 4 years ago
- The jailbreak-evaluation is an easy-to-use Python package for language model jailbreak evaluation.☆27Nov 4, 2024Updated last year
- LogShrink: Effective Log Compression by Leveraging Commonality and Variability of Log Data [ICSE'24 early]☆25Nov 14, 2023Updated 2 years ago
- ☆21Feb 23, 2026Updated last week
- Vagrant plugin for using proxmox as a provider☆20Mar 16, 2023Updated 2 years ago