☆18Sep 8, 2025Updated 5 months ago
Alternatives and similar repositories for CountMamba-WF
Users that are interested in CountMamba-WF are comparing it to the libraries listed below
Sorting:
- ☆26Sep 20, 2023Updated 2 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆64Jan 2, 2024Updated 2 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- ☆10Mar 11, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 5 months ago
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆10Jul 25, 2022Updated 3 years ago
- ☆28May 6, 2021Updated 4 years ago
- It is a network traffic classifier based on deep learning.☆50Mar 16, 2024Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆163Sep 2, 2025Updated 6 months ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆141Apr 29, 2024Updated last year
- ☆18May 9, 2024Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Surakav Implementation☆18May 14, 2024Updated last year
- Materials about Encrypted Traffic Analysis☆329Feb 3, 2026Updated last month
- ☆90Jan 18, 2025Updated last year
- ☆28Jun 24, 2022Updated 3 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- ☆31Oct 14, 2023Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- ☆22Jun 20, 2024Updated last year
- ☆34Oct 10, 2018Updated 7 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆61Dec 7, 2025Updated 3 months ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆13Feb 26, 2024Updated 2 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆94Jan 2, 2024Updated 2 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- ☆10May 26, 2024Updated last year