alirezamohamadiam / Securing-Healthcare-with-Deep-Learning-A-CNN-Based-Model-for-medical-IoT-Threat-DetectionView external linksLinks
Convolutional Neural Network (CNN) for network intrusion
☆24Dec 19, 2025Updated last month
Alternatives and similar repositories for Securing-Healthcare-with-Deep-Learning-A-CNN-Based-Model-for-medical-IoT-Threat-Detection
Users that are interested in Securing-Healthcare-with-Deep-Learning-A-CNN-Based-Model-for-medical-IoT-Threat-Detection are comparing it to the libraries listed below
Sorting:
- ☆11Jan 27, 2026Updated 3 weeks ago
- ☆17Jul 23, 2025Updated 6 months ago
- ☆18May 30, 2025Updated 8 months ago
- TraceFL is a novel mechanism for Federated Learning that achieves interpretability by tracking neuron provenance. It identifies clients r…☆10Nov 12, 2024Updated last year
- A simple JSON library developed for modern C++ using standard library (STD) as the base.☆14Jan 5, 2023Updated 3 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated last year
- The Uber Go Style Guide, translated in Persian(IR)☆24Sep 22, 2023Updated 2 years ago
- Repo on unlearning in FL. FYP22002@HKUCS.☆15Apr 22, 2023Updated 2 years ago
- a simple api for find city and provinces☆66Dec 26, 2025Updated last month
- notebooks related to Data analysis using Python☆12Apr 7, 2020Updated 5 years ago
- The repository contains various python jupyter notebooks of predicting different medical diseases from various open source datasets.The f…☆18Dec 25, 2020Updated 5 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- ☆16Apr 16, 2019Updated 6 years ago
- ☆15Jul 28, 2025Updated 6 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆19Apr 18, 2023Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Aug 1, 2023Updated 2 years ago
- Perform multi-party computation on machine learning applications☆22Jun 21, 2022Updated 3 years ago
- Persian translation of "Clean Code" by Robert C. Martin (Uncle Bob).☆54Oct 19, 2025Updated 3 months ago
- Intrusion Detection system in Cyber security using Deep learning and Neural Networks☆31Nov 19, 2024Updated last year
- Source code for the AI, LLM Engineer Comprehensive Course.☆50Apr 23, 2025Updated 9 months ago
- Causal Responsibility EXplanations for Image Classifiers and Tabular Data☆41Dec 10, 2025Updated 2 months ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- Complete code for the proposed CNN-Transformer model for natural language understanding.☆29Jan 3, 2024Updated 2 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- 《Machine Learning Systems: Design and Implementation》- English Version☆37Jan 27, 2025Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Official PyTorch implementation on ID-GAN: High-Fidelity Synthesis with Disentangled Representation by Lee et al., 2020.☆30Aug 18, 2020Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆35Mar 3, 2023Updated 2 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Apr 19, 2023Updated 2 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Simple CRUD to pratice tests using NestJS + Typescript☆43Feb 19, 2021Updated 4 years ago
- ☆52Aug 19, 2025Updated 5 months ago
- All my interview experiences.☆59Jan 4, 2026Updated last month
- Allows you to use an Arduino to capture LoRa radio network traffic and transfer to a PC for viewing or saving to disk.☆64Jun 20, 2017Updated 8 years ago
- Cross Platform Rust Repl☆50Feb 18, 2024Updated 2 years ago
- MSc module in Applied Cryptography - CSN11131☆73Updated this week
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago