NKU-HLT / Fusion-Insider-threat-detection
[ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion
☆17Updated last year
Alternatives and similar repositories for Fusion-Insider-threat-detection:
Users that are interested in Fusion-Insider-threat-detection are comparing it to the libraries listed below
- Insider threat detection via bert☆19Updated 3 years ago
- Paper List☆18Updated 3 months ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆22Updated 3 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Updated last year
- This is a general framework for fake audio detection using pytorch lightning☆19Updated 6 months ago
- [ACM CCS'24] SafeEar: Content Privacy-Preserving Audio Deepfake Detection☆137Updated last month
- Continual Learning Method RAWM for ICML 2023☆23Updated 7 months ago
- ☆29Updated last year
- ☆11Updated 2 weeks ago
- This is the official repo of our work titled "The Codecfake Dataset and Countermeasures for the Universally Detection of Deepfake Audio".☆55Updated 4 months ago
- Continual Learning Method RWM for AAAI 2024☆20Updated 7 months ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆27Updated last year
- Pytorch implementation of "LEVERAGING POSITIONAL-RELATED LOCAL-GLOBAL DEPENDENCY FOR SYNTHETIC SPEECH DETECTION"☆31Updated last year
- ☆13Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated last year
- ☆49Updated 6 months ago
- ☆19Updated 2 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆66Updated 6 years ago
- [ICASSP 2024] KNN-CTC: Enhancing ASR via Retrieval of CTC Pseudo Labels☆35Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆25Updated 3 years ago
- Public Arena dataset☆12Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆92Updated 6 months ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Synthesis speech detection based on vocoder signature extraction with Supervised Contrastive Learning☆20Updated 7 months ago
- This is the pytorch implementation of our work titled "An Efficient Temporary Deepfake Location Approach Based Embeddings for Partially S…☆18Updated 5 months ago
- Official Implementation of VoxTracer (MM' 23)☆10Updated last year
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆109Updated last month
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 5 months ago
- Retrieval-Augmented MOS Prediction with Prior Knowledge Integration☆25Updated last month