NKU-HLT / Fusion-Insider-threat-detectionLinks
[ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion
☆17Updated last year
Alternatives and similar repositories for Fusion-Insider-threat-detection
Users that are interested in Fusion-Insider-threat-detection are comparing it to the libraries listed below
Sorting:
- Paper List☆18Updated 5 months ago
- Insider threat detection via bert☆20Updated 3 years ago
- [ACM CCS'24] SafeEar: Content Privacy-Preserving Audio Deepfake Detection☆149Updated 3 months ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Updated 2 years ago
- Continual Learning Method RAWM for ICML 2023☆23Updated 9 months ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆25Updated 3 years ago
- [CCS-LAMPS 2024] Mitigating Unauthorized Speech Synthesis for Voice Protection☆17Updated 8 months ago
- This is a general framework for fake audio detection using pytorch lightning☆23Updated 2 months ago
- Continual Learning Method RWM for AAAI 2024☆21Updated 9 months ago
- ☆55Updated 8 months ago
- ☆11Updated 2 months ago
- Code for paper "Audio Deepfake Detection with Self-supervised XLS-R and SLS classifier☆38Updated 4 months ago
- Code and datasets for the paper "Deepfake Text Detection: Limitations and Opportunities"☆29Updated last year
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆10Updated last year
- [ICASSP 2024] KNN-CTC: Enhancing ASR via Retrieval of CTC Pseudo Labels☆37Updated last year
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated last year
- ☆30Updated last year
- This is the official repo of our work titled "The Codecfake Dataset and Countermeasures for the Universally Detection of Deepfake Audio".☆60Updated 6 months ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Prepend universal audio attack segment to mute Whisper☆24Updated 5 months ago
- Qualifying Exam Preparing☆14Updated last month
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆122Updated 3 months ago
- This is the pytorch implementation of our work titled "An Efficient Temporary Deepfake Location Approach Based Embeddings for Partially S…☆18Updated 7 months ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆41Updated 7 months ago
- [ACM MM 24] GROOT:Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis☆16Updated 3 months ago
- Official Implementation of VoxTracer (MM' 23)☆10Updated last year
- [T-IFS'24] Audio Multi-view Spoofing Detection Framework Based on Audio-Text-Emotion Correlations☆23Updated 11 months ago
- ☆54Updated last year
- Materials for "Multimedia Deepfake Detection" Tutorial @ ICME 2024☆16Updated 10 months ago