☆59Jul 10, 2024Updated last year
Alternatives and similar repositories for AnoShift
Users that are interested in AnoShift are comparing it to the libraries listed below
Sorting:
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 10 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- ☆10Nov 15, 2021Updated 4 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆18Aug 3, 2023Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- Official repository for the paper "When Model Meets New Normals: Test-time Adaptation for Unsupervised Time-series Anomaly Detection", AA…☆45May 29, 2025Updated 9 months ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆21Aug 31, 2023Updated 2 years ago
- PyTorch implementation of Anomaly Transformer: Time Series Anomaly Detection with Association Discrepancy☆252Jan 24, 2023Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Unofficial Pytorch implementation of SAINT: Improved Neural Networks for Tabular Data via Row Attention and Contrastive Pretraining https…☆30Nov 20, 2023Updated 2 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- A framework for easy running and evaluating your TSAD algorithm.☆121May 12, 2025Updated 9 months ago
- Battling the Non-stationarity in Time Series Forecasting via Test-time Adaptation (AAAI 2025)☆33Mar 7, 2025Updated 11 months ago
- Realization of stroke classification method Graph Attention Network with Edge Feature Attention using PyTorch.☆22Apr 30, 2021Updated 4 years ago
- Pytorch implementation of UTRAD☆28Apr 23, 2022Updated 3 years ago
- Scripts and utility programs for implementing the USAD architecture.☆260Mar 18, 2024Updated last year
- ☆31Oct 14, 2023Updated 2 years ago
- ☆26Aug 26, 2018Updated 7 years ago
- AGC 5차 대회 소스 코드 저장소입니다.☆10Jun 6, 2023Updated 2 years ago
- A robotframework library that repairs failing Robot Framework tests automatically via AI☆21Feb 5, 2026Updated 3 weeks ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- a time series anomaly detection method based on the calibrated one-class classifier☆72Jul 25, 2025Updated 7 months ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆74Aug 1, 2024Updated last year
- ☆86Feb 24, 2025Updated last year
- Public datasets for time series anomaly detection☆149Sep 21, 2025Updated 5 months ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆38Oct 2, 2020Updated 5 years ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 11 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago