junjieliang672 / FAREView external linksLinks
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
☆29Mar 1, 2022Updated 3 years ago
Alternatives and similar repositories for FARE
Users that are interested in FARE are comparing it to the libraries listed below
Sorting:
- ☆36Jun 10, 2024Updated last year
- ☆24Nov 9, 2020Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- ☆18May 9, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 10 months ago
- The HyFed framework provides an easy-to-use API to develop federated, privacy-preserving machine learning algorithms.☆18Sep 10, 2025Updated 5 months ago
- ☆56Sep 6, 2023Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆32Dec 19, 2024Updated last year
- Artifact evaluation repo for EuroSys'24.☆29Nov 7, 2023Updated 2 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Research simulation toolkit for federated learning☆13Nov 7, 2020Updated 5 years ago
- Code for paper "Interpret Federated Learning with Shapley Values"☆40May 18, 2019Updated 6 years ago
- NEGSC☆47May 30, 2024Updated last year
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- ☆11Mar 7, 2023Updated 2 years ago
- Adversarial learning by utilizing model interpretation☆10Oct 19, 2018Updated 7 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- ☆21Oct 15, 2025Updated 3 months ago
- Large-Scale Graph Inference☆12Nov 6, 2024Updated last year
- Implementation of incremental sequential three-way decisions using active learning☆10May 4, 2019Updated 6 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- ☆11Apr 4, 2022Updated 3 years ago
- A study in multi-center imaging diagnostics, emphasizing on the modality of cardiovascular magnetic resonance and the prediction of hyper…☆11Jul 14, 2021Updated 4 years ago
- SNA on various social graphs including trading networks & Facebook friendship networks.☆10Jun 17, 2020Updated 5 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Jan 23, 2026Updated 3 weeks ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆117Jul 9, 2020Updated 5 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆48Aug 10, 2020Updated 5 years ago
- Speech recognition with federated learning☆11Jan 9, 2020Updated 6 years ago