☆22Sep 8, 2025Updated 7 months ago
Alternatives and similar repositories for CountMamba-WF
Users that are interested in CountMamba-WF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Sep 20, 2023Updated 2 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- ☆29May 6, 2021Updated 4 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆66Jan 2, 2024Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆52Mar 16, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆147Apr 29, 2024Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆165Apr 6, 2026Updated last week
- ☆28Jun 24, 2022Updated 3 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Surakav Implementation☆19May 14, 2024Updated last year
- ☆10Mar 11, 2023Updated 3 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- ☆14Sep 23, 2024Updated last year
- ☆96Jan 18, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- ☆56Sep 6, 2023Updated 2 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- Materials about Encrypted Traffic Analysis☆349Mar 23, 2026Updated 3 weeks ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- ☆19Mar 18, 2021Updated 5 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- ☆18May 9, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆14Mar 5, 2026Updated last month
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆34Oct 10, 2018Updated 7 years ago
- Encrypted Network Traffic Classification using Deep Learning☆59Apr 3, 2024Updated 2 years ago
- ☆22Jun 20, 2024Updated last year
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- Implementation of Large Margin aware Focal (LMF) loss☆22Apr 24, 2025Updated 11 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- ☆17Oct 16, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Iterative training on pseudo-labeled data experiment on the MNIST-dataset☆11Sep 3, 2024Updated last year
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- ☆13May 15, 2022Updated 3 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 4 months ago
- Neural Synchronization: A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication☆19Nov 22, 2024Updated last year