This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Detection" presented at the CRISIS Conference 2020, and "Investigating the Practicality of Adversarial Evasion Attacks on Network Intrusion Detection" submitted to the journal Annals of Telecommunication.
☆10Dec 8, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial_analysis
Users that are interested in adversarial_analysis are comparing it to the libraries listed below
Sorting:
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- ☆21Jan 27, 2025Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- [ICCV2025] [FakeSTormer] Vulnerability-Aware Spatio-Temporal Learning for Generalizable Deepfake Video Detection☆42Jan 27, 2026Updated last month
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated 2 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- HyperPose☆12Nov 6, 2025Updated 3 months ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆10May 26, 2024Updated last year
- ☆10Nov 13, 2025Updated 3 months ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- ☆10Mar 11, 2023Updated 2 years ago