Improving Transferability of Network Intrusion Detection in a Federated Learning Setup
☆13Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for transferability
Users that are interested in transferability are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆31Jan 13, 2024Updated 2 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- About the code release for "Federated PCA on Grassmann Manifold for IoT Anomaly Detection" ToN2024☆21May 28, 2025Updated 10 months ago
- ☆23Oct 22, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NEGSC☆47May 30, 2024Updated last year
- [TNNLS 2024] Improving Semi-supervised Anomaly Detection with Pseudo-anomaly Generation☆19Jul 2, 2024Updated last year
- This is an unofficial implementation of Federated Transfer Learning using UCI Smartphone dataset☆27Nov 27, 2024Updated last year
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- ☆33Oct 14, 2023Updated 2 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- An unofficial PyTorch implementation of "A Sliced Wasserstein Loss for Neural Texture Synthesis" paper [CVPR 2021].☆14Nov 10, 2021Updated 4 years ago
- Tensorflow code for "Hierarchical Decompositional Mixtures of Variational Autoencoders" (ICML'19)☆12Jun 7, 2020Updated 5 years ago
- AutoFR generates filter rules for the web to block ads while considering visual breakage automatically.☆11Mar 12, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 5 years ago
- Spatial Transformer Network YOLO Model for Agricultural Object Detection☆18Sep 18, 2024Updated last year
- 🐌 Detect cyclomatic complexity of your JavaScript and TypeScript code☆23Oct 5, 2024Updated last year
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆37Dec 6, 2024Updated last year
- SDN Security and Monitoring Framework☆16Dec 8, 2022Updated 3 years ago
- ☆17Jan 26, 2025Updated last year
- Reproduce Paper "Federated Learning with Non-IID Data"☆10May 3, 2021Updated 4 years ago
- 🚀 Leveraging advanced RNN with LSTM for efficient, real-time anomaly detection in IoT networks, optimized for performance in resource-co…☆13Nov 25, 2023Updated 2 years ago
- ☆13Aug 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- ☆12Updated this week
- Communication-Efficient Feature-based Federated Transfer Learning☆14Jun 20, 2024Updated last year
- A federated image segmentation method based on style transfer☆16Sep 28, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- An Open Dataset for Wireless Cellular Spectrum Monitoring and Anomaly Detection☆16Mar 16, 2026Updated 3 weeks ago
- An implementation of FedHealth☆11May 26, 2021Updated 4 years ago
- Basic Blockchain-Based Federated Learning Intrusion Detection System☆12Nov 2, 2022Updated 3 years ago
- Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification☆13Aug 25, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Source code for the papers "Deep-reinforcement learning for fair distributed dynamic spectrum access in wireless networks" and "Deep‐rein…☆13Oct 12, 2022Updated 3 years ago
- I implement Firewall on SDN. I write some controller applications that work as Firewall and analyze incoming packets for each host. This…☆11Feb 27, 2017Updated 9 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- Federated learning + blockchain example☆12Sep 13, 2022Updated 3 years ago
- tools for SDN based Traffic Engineering☆20May 18, 2016Updated 9 years ago
- Computational Public Opinion Research☆12Jan 25, 2024Updated 2 years ago
- Pytorch implementation of Wasserstein Auto-Encoders☆25Feb 7, 2018Updated 8 years ago