Ruoyu-Li / UAD-Rule-Extraction
Rule Extraction from Unsupervised Anomaly Detection in Security
☆18Updated last year
Alternatives and similar repositories for UAD-Rule-Extraction:
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
- NEGSC☆36Updated 9 months ago
- ☆15Updated last year
- ☆12Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆33Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆85Updated 2 years ago
- ☆22Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆12Updated last year
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆30Updated 8 months ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆70Updated 3 years ago
- ☆18Updated last year
- ☆20Updated 3 years ago
- Packet Representation Learning for Traffic Classification☆27Updated 3 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- ☆9Updated 2 years ago
- ☆45Updated 3 years ago
- ☆16Updated 8 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆10Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆11Updated 7 months ago
- ☆16Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆17Updated 2 years ago
- Code for IEEE ICDM 23 PREM: A Simple Yet Effective Approach for Node-Level Graph Anomaly Detection☆12Updated 10 months ago
- ☆16Updated 4 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated 10 months ago
- Encrypted Network Traffic Classification using Deep Learning☆52Updated 11 months ago
- ☆52Updated last year
- WWW'23 Research Paper: TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆81Updated 2 months ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago