TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation
☆21Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for WCGAN-GP
Users that are interested in WCGAN-GP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection☆28Jan 17, 2024Updated 2 years ago
- En este proyecto se evalúan y comparan diferentes técnicas de aprendizaje automático para la detección de intrusiones en red.☆28Nov 1, 2022Updated 3 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- The harpoon network traffic generator.☆16Feb 13, 2018Updated 8 years ago
- A set of standard ECG processing features described in 'Support vector machine-based arrhythmia classification using reduced features of …☆11Sep 1, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The official implementation of the paper "Rethinking Data Augmentation for Tabular Data in Deep Learning"☆14Oct 8, 2023Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆51Sep 20, 2024Updated last year
- ☆19Mar 18, 2021Updated 5 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆54Mar 16, 2026Updated last week
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated last year
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- Another Wheel to parse json☆11Mar 13, 2020Updated 6 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- The repository is dedicated to Evasion Generative Adversarial Network source code.☆16Jun 9, 2022Updated 3 years ago
- Implementation of RCALAD Model based on "Anomaly Detection Using Complete Cycle Consistent Generative Adversarial Network" paper *Officia…☆15Dec 31, 2024Updated last year
- A Personalized Zero-Shot ECG Anomaly Monitoring System: From Sparse Representation Based Domain Adaption to Energy Efficient Suspicious B…☆23Jul 28, 2022Updated 3 years ago
- ☆18Jul 17, 2025Updated 8 months ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DeepLearning for Tabular Data with FT_Transformer & ResNet☆26Nov 8, 2022Updated 3 years ago
- 基于强化学习的异构感知高能效联邦学习调度系统☆14Apr 13, 2024Updated last year
- ☆43Dec 26, 2020Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- FIWARE 401: IDM - Managing Users and Organizations☆10Jan 27, 2026Updated last month
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Integrate a DASH7 gateway with the ThingsBoard platform☆10Oct 10, 2018Updated 7 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- ECGDL: A framework for comparative study of databases and computational methods for arrhythmia detection from single-lead ECG☆19Aug 31, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆19Feb 2, 2023Updated 3 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- Utilities, documentation and example code for Solar Pi Platter☆11Aug 28, 2022Updated 3 years ago
- An RDP to VNC bridge☆12Feb 21, 2018Updated 8 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆30Jan 13, 2024Updated 2 years ago
- [AAAI'25] "Decomposed Spatio-Temporal Mamba for Long-Term Traffic Prediction"☆19May 30, 2025Updated 9 months ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago