Detection of IoT devices infected by malwares from their network communications, using federated machine learning
☆41May 4, 2024Updated 2 years ago
Alternatives and similar repositories for fed_iot_guard
Users that are interested in fed_iot_guard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Jan 14, 2023Updated 3 years ago
- Apply Federated Learning and Deep Learning (Deep Auto-encoder) to detect abnormal data for IoT devices.☆36Aug 16, 2022Updated 3 years ago
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- 基于源代码的图融合的智能合约漏洞检测☆24Apr 23, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An implementation of FedHealth☆11May 26, 2021Updated 4 years ago
- Multimodal Federated Learning on IoT Data☆11Dec 17, 2023Updated 2 years ago
- QR-SDN code☆18May 28, 2021Updated 4 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 3 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- This code uses federated learning to forecast electrical power consumption of households while protecting data privacy.☆12Mar 9, 2024Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Code for the case study presented in "Making a Case for Federated Learning in the Internet of Vehicles and Intelligent Transportation Sys…☆27Apr 9, 2021Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- Investigation of Android mobile Malware using the SherLock dataset☆14Jun 29, 2017Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆11May 1, 2021Updated 5 years ago
- ☆11Feb 8, 2026Updated 3 months ago
- ☆11Oct 13, 2020Updated 5 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆41Apr 17, 2025Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆29Sep 10, 2024Updated last year
- 🚖 EcoJourney - Your Optimum Travel Planner☆13Feb 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- Adaptive Offloading of Federated Learning on IoT Devices☆76Nov 18, 2022Updated 3 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆11May 28, 2022Updated 3 years ago
- ☆16Oct 1, 2025Updated 7 months ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆14Dec 21, 2018Updated 7 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 5 months ago
- Detecting DDOS attacks via machine/deep learning☆32Dec 26, 2022Updated 3 years ago
- 在cifar10数据集下对resnet-18加入se-net的效果测试☆10May 9, 2019Updated 7 years ago
- FL-TP: Federated Learning-based Vehicle Trajectory Prediction Algorithm against Cyberattacks☆27Jun 20, 2024Updated last year