Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks"
☆15Jul 31, 2024Updated last year
Alternatives and similar repositories for Structural_attacks_GNN_NIDS
Users that are interested in Structural_attacks_GNN_NIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆14Dec 23, 2023Updated 2 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- NEGSC☆48May 30, 2024Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆78Oct 11, 2021Updated 4 years ago
- [TNNLS 2024] Improving Semi-supervised Anomaly Detection with Pseudo-anomaly Generation☆19Jul 2, 2024Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆34Jan 13, 2024Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆19Oct 7, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- ☆20Jul 10, 2024Updated last year
- A Graph Neural Network-based Intrusion Detection System☆37Aug 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- code for progressive gsl☆12Jan 15, 2026Updated 3 months ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- Network Intrusion Detection using GNN☆29Feb 13, 2025Updated last year
- ☆16Dec 8, 2021Updated 4 years ago
- rosploit tools☆16Apr 9, 2021Updated 5 years ago
- 問答機器人評分系統☆11Dec 4, 2022Updated 3 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 5 years ago
- Official Code for FedRule: Federated Rule Recommendation System with Graph Neural Networks☆14Sep 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆47Dec 25, 2025Updated 4 months ago
- Official PyTorch implementation for the paper ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection (AAAI 2024).☆30May 14, 2025Updated 11 months ago
- FL-based intrusion detection system development using model averaging.☆45Dec 18, 2022Updated 3 years ago
- ☆20Jan 26, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆34Dec 18, 2022Updated 3 years ago
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆59Apr 30, 2021Updated 5 years ago
- ☆34Oct 14, 2023Updated 2 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 6 years ago
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- An Open Dataset for Wireless Cellular Spectrum Monitoring and Anomaly Detection☆16Mar 16, 2026Updated last month
- ☆15Feb 26, 2025Updated last year
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago