Apply modern, deep learning techniques for anomaly detection to identify network intrusions.
☆51Dec 3, 2024Updated last year
Alternatives and similar repositories for CML_AMP_Anomaly_Detection
Users that are interested in CML_AMP_Anomaly_Detection are comparing it to the libraries listed below
Sorting:
- Build a semantic search application with deep learning models.☆15Dec 3, 2024Updated last year
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆13Aug 28, 2024Updated last year
- Build an scikit-learn model to predict churn using customer telco data.☆17Dec 6, 2024Updated last year
- ☆16Jul 15, 2022Updated 3 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Perform topic classification on news articles in several limited-labeled data regimes.☆18Dec 3, 2024Updated last year
- Learn how to explain ML models using LIME and SHAP.☆29Oct 3, 2023Updated 2 years ago
- ☆59Jan 8, 2026Updated last month
- The Medkit-Learn(ing) Environment: Medical Decision Modelling through Simulation (NeurIPS 2021) by Alex J. Chan, Ioana Bica, Alihan Huyuk…☆29Jan 5, 2022Updated 4 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Pytorch implementation of GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection☆29Jul 7, 2022Updated 3 years ago
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆10Jun 7, 2022Updated 3 years ago
- Transfer Learning for Survival Analysis via Efficient L2,1-norm Regularized Cox Regression☆13Sep 18, 2016Updated 9 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- Fast API Endpoint!. This project examines, analyses the malware statically & dynamically using conventional strategies and also apply mac…☆10Apr 10, 2023Updated 2 years ago
- Efficient Learning Interpretable Shapelets for Accurate Time Series Classification, ICDE 2018☆14Feb 23, 2018Updated 8 years ago
- ☆10May 28, 2024Updated last year
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Online Comment Toxicity Analysis using averaging the Classifiers and used both char level as well as word level n-grams.☆10Mar 31, 2018Updated 7 years ago
- This is for Meridian (Traditional Chinese Medicine conception) prediction by machining learning method.☆11Sep 30, 2019Updated 6 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆237Nov 16, 2022Updated 3 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- AutoEncoder implements by keras. Including AE, DAE, DAE_CNN, VAE, VAE_CNN, CVAE, Sparse AE, Stacked DAE.☆41Apr 7, 2020Updated 5 years ago
- A PyTorch implementation of of E-GraphSAGE.☆103Jun 30, 2022Updated 3 years ago
- Free and Open Platform for AI-assisted Computing☆10May 19, 2019Updated 6 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- This is a project of Interspeech2021 paper "SpecMix : A Mixed Sample Data Augmentation method for Training with Time-Frequency Domain Fea…☆11Sep 27, 2022Updated 3 years ago
- This repository contains all the source code needed to reproduce the experiments or review the results obtained in the research paper "…☆13Dec 9, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- h5涂色小游戏☆12Jan 1, 2023Updated 3 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 5 months ago
- A small database to test different machine learning tasks. It contains simple shapes of different colors.☆11Sep 18, 2022Updated 3 years ago
- This repo contains industry use cases and application code for GenAI☆14Oct 25, 2024Updated last year
- Efficient minimax optimization for deep adversarial learning, and more.☆10Mar 28, 2019Updated 6 years ago
- Codes for the Nature Conservancy Fish classification challenge☆10Jan 2, 2017Updated 9 years ago
- The framework for automatic, robust detection and localisation of objects (primarily faces) through menpo framework.☆11Oct 2, 2020Updated 5 years ago