TrusteeML / emperorLinks
AI/ML and Cybersecurity: The Emperor has no Clothes
☆17Updated last year
Alternatives and similar repositories for emperor
Users that are interested in emperor are comparing it to the libraries listed below
Sorting:
- ☆57Updated last month
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- ☆15Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆26Updated 5 months ago
- ☆26Updated 4 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆105Updated last year
- Packet Representation Learning for Traffic Classification☆29Updated 5 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- A tunneled flooding traffic detection system.☆23Updated 6 months ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- Implementation of AppScanner☆41Updated 2 years ago
- (SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare☆86Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆54Updated last year
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆83Updated 2 years ago
- ☆46Updated last year
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆33Updated 6 years ago
- ☆22Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆72Updated 3 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆49Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated 2 months ago
- ☆25Updated 11 months ago
- ☆25Updated last year
- Netgpt: Generative pretrained transformer for network traffic☆24Updated 4 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago