网络安全中的人工智能方法,总结我在中国科学院大学的学习以及自己整理的资料、方法,给大家分享出来
☆100Jan 16, 2026Updated last month
Alternatives and similar repositories for ml-for-security
Users that are interested in ml-for-security are comparing it to the libraries listed below
Sorting:
- This is the official repo for our paper: "Generative Knowledge-Guided Retrieval System for Construction Disclosure Documents Reviewing"☆21Nov 17, 2025Updated 3 months ago
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- ☆90Jan 18, 2025Updated last year
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆418Nov 5, 2025Updated 4 months ago
- 一个流量分类的封装框架☆62Aug 25, 2024Updated last year
- Honeypot 蜜罐系统 基于Go语言开发的分布式蜜罐系统,用于网络安全监测、攻击行为捕获与分析。A distributed honeypot system developed in Go for network security monitoring, attack b…☆16Mar 29, 2025Updated 11 months ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Sep 1, 2025Updated 6 months ago
- ComfyUI Workflow Collection | ComfyUI 工作流合集☆20Dec 6, 2024Updated last year
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆17Jun 18, 2024Updated last year
- 基于文心一言和树莓派Pico的最简易桌面宠物☆86Sep 16, 2025Updated 5 months ago
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆158Mar 25, 2025Updated 11 months ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆57Nov 5, 2025Updated 4 months ago
- 通过带领大家解读Transformer模型来加深对模型的理解☆235Jun 3, 2025Updated 9 months ago
- Building BERT Model with PyTorch☆23Dec 9, 2024Updated last year
- An AI-powered content conversion tool that transforms text, web content, or HTML code into beautifully designed card images.一款基于AI的内容转换工…☆33Jul 29, 2025Updated 7 months ago
- SWACloud Project — SWA V2 for Steam☆24Nov 19, 2025Updated 3 months ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- ☆36Jun 10, 2024Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- ☆31Oct 14, 2023Updated 2 years ago
- ☆12Nov 30, 2018Updated 7 years ago
- Implementation of paper - YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors☆35Dec 19, 2023Updated 2 years ago
- ☆20Feb 5, 2026Updated last month
- This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection met…☆11Jul 22, 2019Updated 6 years ago
- Materials about Encrypted Traffic Analysis☆329Feb 3, 2026Updated last month
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆39Jun 27, 2024Updated last year
- Hugging Face Audio Course中文版,帮助学习者快速入门音频模态☆37May 25, 2024Updated last year
- 秦志金教授论文☆11Sep 14, 2021Updated 4 years ago
- ☆12Jun 19, 2024Updated last year
- yolo目标检测算法☆15Jul 27, 2025Updated 7 months ago
- ☆22Aug 29, 2025Updated 6 months ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- CNN with FHE to identify if there is a human present in a picture. It was developed using Concrete ML from Zama.☆14Feb 18, 2024Updated 2 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 10 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆14Feb 27, 2026Updated last week
- AscensionPath☆15Jun 15, 2025Updated 8 months ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- Self Tuned Openwrt for NanoPi R2S☆11May 11, 2025Updated 9 months ago