This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Detection" presented at the CRISIS Conference 2020, and "Investigating the Practicality of Adversarial Evasion Attacks on Network Intrusion Detection" submitted to the journal Annals of Telecommunication.
☆10Dec 8, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial_analysis
Users that are interested in adversarial_analysis are comparing it to the libraries listed below
Sorting:
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- some basic algorithms explored on the Yee Grid in FDTD☆14Sep 22, 2018Updated 7 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- ☆21Jan 27, 2025Updated last year
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- [ICCV2025] [FakeSTormer] Vulnerability-Aware Spatio-Temporal Learning for Generalizable Deepfake Video Detection☆46Jan 27, 2026Updated last month
- HyperPose☆12Nov 6, 2025Updated 4 months ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- A implementation of PSPNet with MindSpore☆11Dec 19, 2022Updated 3 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- [CVPR2023] Official implementation of Knowledge Distillation for 6D Pose Estimation by Aligning Distributions of Local Predictions☆14May 29, 2023Updated 2 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆85Jan 13, 2022Updated 4 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- ☆16Oct 18, 2023Updated 2 years ago
- 北京邮电大学学士学位论文Word模板☆18Oct 8, 2024Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆50Jul 12, 2024Updated last year
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated 3 months ago
- ☆18Mar 30, 2025Updated 11 months ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- A beginner friendly repository for getting started with adversarial machine learning in PyTorch☆26Apr 20, 2022Updated 3 years ago
- ☆18Sep 30, 2019Updated 6 years ago
- DeepvisionAI-backend is the code core of a desktop software providing detection/tracking of pedestrians and abnormal crowd activity using…☆17Dec 21, 2021Updated 4 years ago
- Turkish Spell Checker Library☆15Updated this week
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Rotation of spherical harmonics using Wigner-D matrices☆17May 20, 2025Updated 10 months ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Aug 22, 2025Updated 7 months ago