Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks"
☆15Jul 31, 2024Updated last year
Alternatives and similar repositories for Structural_attacks_GNN_NIDS
Users that are interested in Structural_attacks_GNN_NIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆28Feb 23, 2026Updated last month
- NEGSC☆47May 30, 2024Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- A PyTorch implementation of of E-GraphSAGE.☆103Jun 30, 2022Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆30Jan 13, 2024Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- ☆20Jul 10, 2024Updated last year
- A Graph Neural Network-based Intrusion Detection System☆32Aug 12, 2024Updated last year
- code for progressive gsl☆12Jan 15, 2026Updated 2 months ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- ☆16Dec 8, 2021Updated 4 years ago
- Network-Based Malware Detection using Natural Language Processing☆14May 10, 2021Updated 4 years ago
- 問答機器人評分系統☆11Dec 4, 2022Updated 3 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 4 years ago
- Official PyTorch implementation for the paper ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection (AAAI 2024).☆31May 14, 2025Updated 10 months ago
- ☆31Oct 14, 2023Updated 2 years ago
- FL-based intrusion detection system development using model averaging.☆44Dec 18, 2022Updated 3 years ago
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆58Apr 30, 2021Updated 4 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 6 years ago
- An Open Dataset for Wireless Cellular Spectrum Monitoring and Anomaly Detection☆16Mar 16, 2026Updated last week
- ☆14Feb 26, 2025Updated last year
- ☆14Mar 2, 2023Updated 3 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- Official code for Fisher information embedding for node and graph learning (ICML 2023)☆19Jun 17, 2023Updated 2 years ago
- Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification☆11Aug 25, 2023Updated 2 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago