YeongHyeon / Skip-GANomalyView external linksLinks
Implementation of Skip-GANomaly with MNIST dataset
☆11Nov 28, 2019Updated 6 years ago
Alternatives and similar repositories for Skip-GANomaly
Users that are interested in Skip-GANomaly are comparing it to the libraries listed below
Sorting:
- TensorFlow implementation of GANomaly (with MNIST dataset)☆10Dec 2, 2020Updated 5 years ago
- Learning image representations for anomaly detection: application to discovery of histological alterations in drug development☆20Jan 9, 2024Updated 2 years ago
- Tensorflow2 implementation of the paper GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training☆21Jan 18, 2021Updated 5 years ago
- Source code for Skip-GANomaly paper☆197Dec 8, 2022Updated 3 years ago
- [TCSVT 2024] Official Implementation for "Progressive Boundary Guided Anomaly Synthesis for Industrial Anomaly Detection"☆33Jul 18, 2025Updated 6 months ago
- Implementation of GANomaly with MNIST dataset☆17Nov 19, 2019Updated 6 years ago
- ☆25Nov 21, 2022Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Pytorch implementation of "Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery"☆67Apr 22, 2020Updated 5 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- [EAAI 2024] Template-based Feature Aggregation Network for industrial anomaly detection☆11Mar 6, 2025Updated 11 months ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- ☆14Apr 1, 2025Updated 10 months ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- ☆11Oct 28, 2023Updated 2 years ago
- [MICCAI 2024] RadiomicsFill-Mammo: Synthetic Mammogram Mass Manipulation with Radiomics Features☆10Aug 22, 2025Updated 5 months ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- ☆10Jul 28, 2021Updated 4 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- ☆11Dec 16, 2021Updated 4 years ago
- ☆10May 26, 2024Updated last year
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- code for《Python3网络爬虫开发实战》☆12Oct 15, 2018Updated 7 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- ☆10Mar 7, 2023Updated 2 years ago
- Technical Challenge Repository for Visual Anomaly Detection Workshop (VAND) at CVPR☆13Jul 21, 2025Updated 6 months ago
- Keras workspace for Sipeed MAIX boards☆11Apr 25, 2019Updated 6 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago