horizonsinzqs / QueryAttackLinks
The source code of QueryAttack.
☆18Updated 5 months ago
Alternatives and similar repositories for QueryAttack
Users that are interested in QueryAttack are comparing it to the libraries listed below
Sorting:
- FlexNF: Flexible Network Function Orchestration for Scalable On-Path Service Chain Serving, ToN 2023 && IWQoS 2021☆19Updated last year
- Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask, SIGKDD 2024☆20Updated last month
- I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning,UbiComp 2023 && AAMAS 2023☆15Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆70Updated 3 months ago
- ☆44Updated 2 months ago
- Related code and datasets on NetBench: A Large-Scale and Comprehensive Network Traffic Benchmark Dataset for Foundation Models☆30Updated last year
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆19Updated 5 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆17Updated 3 years ago
- An official implementation of "Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective" (KDD 2024)☆12Updated 10 months ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆11Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- ☆31Updated 5 months ago
- ☆41Updated last year
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆143Updated 7 months ago
- ☆43Updated 4 months ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆28Updated 3 years ago
- ☆16Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 11 months ago
- A dataset repository of "Accurate Action Recommendation for Smart Home via Two-Level Encoders and Commonsense Knowledge" (CIKM 2022)☆14Updated 2 years ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆25Updated 8 months ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆289Updated 3 months ago
- ☆31Updated last month
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆47Updated last year
- ☆12Updated last year
- ☆12Updated 4 years ago
- Multimodal Large Language Models for Code Generation under Multimodal Scenarios☆104Updated this week
- Agent Security Bench (ASB)☆95Updated last month
- Netgpt: Generative pretrained transformer for network traffic☆26Updated 6 months ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆21Updated last year