Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks
☆30Aug 28, 2022Updated 3 years ago
Alternatives and similar repositories for fgnet
Users that are interested in fgnet are comparing it to the libraries listed below
Sorting:
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 9 months ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- ☆30Oct 7, 2025Updated 4 months ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆122Jan 8, 2025Updated last year
- ☆14Sep 15, 2021Updated 4 years ago
- ☆13May 15, 2022Updated 3 years ago
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Mar 2, 2024Updated last year
- ☆20Mar 25, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆61Feb 28, 2023Updated 3 years ago
- ☆20Jul 10, 2024Updated last year
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- Materials about Encrypted Traffic Analysis☆319Feb 3, 2026Updated 3 weeks ago
- ☆20Jan 20, 2021Updated 5 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- ☆14Apr 1, 2025Updated 11 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Implementation of AppScanner☆46Jul 29, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- ☆11Oct 28, 2023Updated 2 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- ☆10Mar 7, 2023Updated 2 years ago
- 从pcap获取流的基本信息工具☆230Jul 31, 2023Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Code and dataset for AppScanner☆32Jul 3, 2017Updated 8 years ago
- ☆18Sep 8, 2025Updated 5 months ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- ☆36Jun 10, 2024Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Jan 7, 2025Updated last year
- It is a network traffic classifier based on deep learning.☆50Mar 16, 2024Updated last year