FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
☆29Mar 1, 2022Updated 4 years ago
Alternatives and similar repositories for FARE
Users that are interested in FARE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆38Jun 10, 2024Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 3 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- ☆18May 9, 2024Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆56Sep 6, 2023Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆34Dec 19, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- ☆26Jul 6, 2023Updated 2 years ago
- The HyFed framework provides an easy-to-use API to develop federated, privacy-preserving machine learning algorithms.☆18Sep 10, 2025Updated 6 months ago
- ☆31Oct 15, 2025Updated 5 months ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- Adversarial learning by utilizing model interpretation☆10Oct 19, 2018Updated 7 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆67Dec 7, 2025Updated 3 months ago
- ☆12Aug 20, 2023Updated 2 years ago
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- NEGSC☆47May 30, 2024Updated last year
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆119Jul 9, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆54Mar 16, 2026Updated last week
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 3 months ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆11Jun 19, 2024Updated last year
- ☆21Jan 17, 2022Updated 4 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 6 months ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- ☆55Nov 3, 2019Updated 6 years ago
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- ☆11May 14, 2020Updated 5 years ago