IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection
☆28Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for IDSGAN
Users that are interested in IDSGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆52Sep 20, 2024Updated last year
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 3 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆29Sep 10, 2024Updated last year
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- DuBE: Duple-balanced Ensemble Learning from Skewed Data☆10Oct 31, 2022Updated 3 years ago
- ☆16Jul 15, 2022Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- The harpoon network traffic generator.☆16Feb 13, 2018Updated 8 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆25Dec 24, 2021Updated 4 years ago
- ☆18Apr 26, 2022Updated 4 years ago
- "CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection" Code, move from github.com/leyiweb/CAN_…☆20Oct 2, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🕵️♂️ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.☆15Apr 7, 2024Updated 2 years ago
- 微信小程序 扫雷小游戏☆21Oct 11, 2017Updated 8 years ago
- 基于CodeBert预训练模型,微调后/直接对目标数据集进行测试☆14Oct 19, 2021Updated 4 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- ☆16Oct 18, 2023Updated 2 years ago
- 北京邮电大学学士学位论文Word模板☆18Oct 8, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆18Mar 30, 2025Updated last year
- uPU, nnPU and PN learning with Extra Trees classifier.☆20Dec 2, 2024Updated last year
- Another Wheel to parse json☆11Mar 13, 2020Updated 6 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Mar 20, 2026Updated last month
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Use Introduction☆21Aug 4, 2019Updated 6 years ago
- EL-CodeBert: Better Exploiting CodeBert to Support Source Code-Related Classification Tasks☆14Feb 17, 2022Updated 4 years ago
- code space of paper "Safety Layers in Aligned Large Language Models: The Key to LLM Security" (ICLR 2025)☆24Apr 26, 2025Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- ☆12Jun 3, 2019Updated 6 years ago
- ☆18Nov 26, 2024Updated last year