采用VAE模型实现网络流量异常检测,并结合联邦学习与蒸馏学习
☆16Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for FedVAE
Users that are interested in FedVAE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 定义了网络流量数据的分布外数据类型,其次介绍了两个检测方法使用到的知识或技术,并利用这些技术知识设计了基于两种检测方法的分布外异常检测系统。☆10Sep 26, 2023Updated 2 years ago
- 将联邦学习以及知识蒸馏用于搭建网络入侵检测检测模型,在NSL-KDD数据集上进行了验证。☆31Jun 29, 2023Updated 2 years ago
- 基于动态图神经网络的异常流量检测方法☆49May 23, 2023Updated 2 years ago
- CNN网络入侵检测☆58Apr 12, 2024Updated last year
- 《数据思维与实践》课程学习社区☆11Jan 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 基于神经网络的流量异常检测☆154Jul 28, 2020Updated 5 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- 使用改良的Transformer模型应用于多维时间序列的分类任务上☆11Feb 8, 2021Updated 5 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Sep 2, 2022Updated 3 years ago
- CUMT 计算机科学与技术 2016版培养方案 课程资源☆10Sep 7, 2022Updated 3 years ago
- 针对一维时间序列数据,采用GMM和K-Means算法进行异常点检测。For one-dimensional time series data, GMM and K-means algorithm are used to detect outliers.☆11Jan 16, 2021Updated 5 years ago
- 032 基于Spark个性化图书推荐系统-设计展示 python pyspark hadoop django scrapy vue element-plus 协同过滤算法 通过scrapy爬虫框架抓取“豆瓣读书”网站上的书籍数据 前台用户通过登陆注册后进入系统 管理员可在后…☆10May 25, 2023Updated 2 years ago
- 2025年1月最新版ChatGPT Plus订阅指南(推荐代升级服务)☆11Dec 29, 2024Updated last year
- 时间序列建模、混沌时间序列预测☆10Apr 24, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆10Mar 7, 2023Updated 3 years ago
- ☆10Sep 22, 2024Updated last year
- 多变量时序预测transformer☆17Sep 13, 2022Updated 3 years ago
- 马甲包检查相似度☆18Jul 16, 2023Updated 2 years ago
- ☆21Sep 20, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- Full Keras Transformer neural network (encoder and decoder) for SOC estimation (time-series prediction)☆19Jan 15, 2023Updated 3 years ago
- A blockchain demo that supports user attribute storage and authentication based on Ethereum and Web3.py☆11Sep 26, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 本项目是一个基于Python的自动化数据爬取应用,旨在从懂车帝网站(https://www.dongchedi.com )爬取汽车系列及其模型的详细信息和相关图片。整个项目分为两个主要部分:第一部分使用Selenium和BeautifulSoup库来爬取汽车系列的基本信息,…☆16Mar 30, 2024Updated 2 years ago
- 图片相似性对比的python实现☆21Dec 9, 2019Updated 6 years ago
- This is an official implementation for the ICLR2023 paper "The Best of Both Worlds: Accurate Global and Personalized Models through Feder…☆22Mar 4, 2025Updated last year
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- 毕设项目 异常流量识别和带宽检测系统☆19Jul 10, 2023Updated 2 years ago
- Implementation of followinf estimation algorithms in python: Kalman Filter, Extended Kalman Filter, Unscented Kalman Filter, Cubature Kal…☆11Dec 2, 2023Updated 2 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- The source code for the paper "Beyond Similarity: Personalized Federated Recommendation with Composite Aggregation, ACM TOIS 2026".☆13Dec 20, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- repo in several methods FedAvg, FedMD, FedProto, FedProx, FedHKD.☆27Nov 21, 2023Updated 2 years ago
- A simple implementation of Transformer Encoder in keras. This repository also includes an example of Transformer as a classifier and its …☆16Apr 9, 2019Updated 6 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- 此项目基于https://github.com/Lighter207/CUMT-undergraduate-latex-template2022☆20Dec 26, 2023Updated 2 years ago
- 基于协同过滤-文本相似度的图书推荐系统,Flask web框架☆18Apr 1, 2022Updated 3 years ago
- ☆11May 29, 2024Updated last year