☆15Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for CPIP
Users that are interested in CPIP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆74Apr 6, 2025Updated last year
- ☆10Nov 15, 2021Updated 4 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Oct 21, 2023Updated 2 years ago
- Algorithms of rule extraction from neural networks☆35Mar 24, 2023Updated 3 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- ☆27Jan 20, 2023Updated 3 years ago
- Control your Canon Camera wirelessly with Cine Remote's easy-to-use interface.☆67Mar 3, 2025Updated last year
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- getopt for vcpkg☆11Aug 20, 2025Updated 7 months ago
- Python bindings for BGPKIT software☆18Jun 12, 2025Updated 10 months ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆382Mar 24, 2026Updated 2 weeks ago
- ☆16Feb 6, 2021Updated 5 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Evolutionary decision trees☆11Jun 16, 2025Updated 9 months ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆58Jun 26, 2024Updated last year
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- 针对iris,sonar数据集的K_means(k均值聚类),FCM(模糊均值聚类)算法,以及minst,yale人脸数据集的SVM与包分类☆11Jan 20, 2021Updated 5 years ago
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- ☆14May 28, 2023Updated 2 years ago
- ☆14Sep 23, 2024Updated last year
- Code for KDD' 21 paper: Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering☆42Jan 23, 2023Updated 3 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- A PyTorch implementation of of Anomal-E.☆43Dec 16, 2022Updated 3 years ago
- ☆10Jan 11, 2024Updated 2 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This project accelerates deep learning models on the edge with the support of running ensemble learning for performance improvement. The …☆11Jun 21, 2022Updated 3 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Quantized Tensorflow Estimator for Google EdgeTpu Accelerator, Dev Board and Intel Neural Compute Stick 2☆14May 9, 2019Updated 6 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- ☆17Apr 17, 2024Updated last year
- source code of paper 'Auto-STGCN: Autonomous Spatial-Temporal Graph Convolutional Network Search Based on Reinforcement Learning and Exis…☆11Jan 26, 2021Updated 5 years ago
- Code for paper "Locally Distributed Deep Learning Inference on Edge Device Clusters"☆15Aug 22, 2025Updated 7 months ago