S-Mohammad-Hashemi / RePOLinks
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
☆25Updated 5 years ago
Alternatives and similar repositories for RePO
Users that are interested in RePO are comparing it to the libraries listed below
Sorting:
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆31Updated last year
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- Attention Model for Network Intrusion Detection☆18Updated 6 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- CICIDS2017 dataset☆69Updated 4 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆49Updated last year
- ☆20Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆47Updated last year
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆39Updated 5 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆50Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 4 years ago
- ☆31Updated 2 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Updated 9 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Updated 5 years ago
- ☆23Updated 5 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- ☆24Updated 3 years ago
- ☆10Updated 2 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆26Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆90Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 4 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Updated 5 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- ☆48Updated 3 years ago