A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system
☆22Aug 24, 2021Updated 4 years ago
Alternatives and similar repositories for VulnerGAN-py
Users that are interested in VulnerGAN-py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- Code for the paper(VDoTR: Vulnerability Detection Based on Tensor Representation \\of Comprehensive Code Graphs)☆17Apr 23, 2023Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Jul 15, 2022Updated 3 years ago
- ☆10Dec 8, 2023Updated 2 years ago
- 📖源码安全相关的论文收集(污点分析/符号执行/模糊测试)☆21Oct 23, 2021Updated 4 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆18Jun 15, 2021Updated 4 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 2 years ago
- 本项目使用Keras实现Transformer模型来进行文本分类(中文、英文均支持)。☆12Mar 31, 2022Updated 4 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Jul 24, 2022Updated 3 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 7 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- ☆22Nov 16, 2025Updated 5 months ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- 🕵️♂️ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.☆15Apr 7, 2024Updated 2 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Apr 3, 2023Updated 3 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- ☆21Oct 13, 2023Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection☆15Dec 19, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Trainable convolution for quantum-classical hybrid algorithms☆14Jul 10, 2023Updated 2 years ago
- ☆14Jun 26, 2022Updated 3 years ago
- mBERT is a mutation testing tool that uses a pre-trained language model (CodeBERT) to generate mutants.☆17Aug 20, 2025Updated 7 months ago
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- ☆13Jan 16, 2018Updated 8 years ago
- Secure and utility-aware data collection with condensed local differential privacy☆17Apr 13, 2020Updated 6 years ago