XAIseries / LEXNetLinks
LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification
☆14Updated last year
Alternatives and similar repositories for LEXNet
Users that are interested in LEXNet are comparing it to the libraries listed below
Sorting:
- ☆15Updated last year
- Packet Representation Learning for Traffic Classification☆29Updated 5 months ago
- ☆25Updated last year
- ☆12Updated last year
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- ☆18Updated 4 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆18Updated 8 months ago
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆16Updated 5 months ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆26Updated 5 months ago
- ☆25Updated 11 months ago
- 论文Encrypted Traffic Classification with One-dimensional Convolution Neural Networks的torch实现☆35Updated 2 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆19Updated 6 months ago
- ☆12Updated last year
- ☆9Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆23Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆13Updated 3 months ago
- using 2d-cnn to classify network traffic☆20Updated 5 years ago
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆31Updated 4 years ago
- ☆58Updated 2 years ago
- ☆24Updated 7 months ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- NEGSC☆38Updated last year
- ☆11Updated 3 years ago
- ☆15Updated last year
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆16Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆68Updated 2 months ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆19Updated last month
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆34Updated 6 months ago