Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"
☆15Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for Supervised-contrastive-learning-over-prototype-label-embeddings
Users that are interested in Supervised-contrastive-learning-over-prototype-label-embeddings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- PyTorch implementation of "Online Hyperparameter Optimization for Class-Incremental Learning" (AAAI 2023 Oral)☆17Jun 30, 2023Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆24Aug 7, 2023Updated 2 years ago
- Using RL for anomaly detection in NSL-KDD☆124Mar 25, 2023Updated 3 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- ☆14Apr 26, 2022Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- trying out to implement Deep Tamer☆15Mar 16, 2022Updated 4 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- Repository for transfer learning for anomaly detection.☆15Nov 28, 2019Updated 6 years ago
- Reproduction code for WGAN-LP☆15Dec 27, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- ☆19Nov 21, 2023Updated 2 years ago
- Finetuned Deepseek 8b model for finance reasoning☆17Feb 14, 2025Updated last year
- ☆12Apr 7, 2026Updated last week
- Implementation of an online learning algorithm to do classification under concept drift☆23Nov 20, 2017Updated 8 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Demonising Adversarial Auto-encoder in PyTorch☆24Nov 28, 2018Updated 7 years ago
- ☆25May 2, 2025Updated 11 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆57May 15, 2019Updated 6 years ago
- A small example of how to use the bls-eth-go-binary☆13Oct 18, 2022Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆22Mar 30, 2021Updated 5 years ago
- Artifact of TOSEM accepted paper: "Try with Simpler - An Evaluation of Improved PCA in Log-based Anomaly Detection."☆14Dec 31, 2022Updated 3 years ago
- Source code for "MEDIMP: 3D Medical Images with clinical Prompts from limited tabular data for renal transplantation", MIDL 2023, https:/…☆10Apr 29, 2023Updated 2 years ago
- ☆60Jul 10, 2024Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 4 years ago
- ☆17Jun 4, 2024Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- [IJCV 2022] Domain-Specific Bias Filtering for Single Labeled Domain Generalization☆12Nov 10, 2022Updated 3 years ago
- [TMI'22] Personalized Retrogress-Resilient Federated Learning Towards Imbalanced Medical Data☆15Jul 20, 2022Updated 3 years ago
- This work studies imbalanced domain generalization.☆12Dec 26, 2022Updated 3 years ago
- Code for paper "Source Data and Target Annotations Agnostic Transferability Representation for Source-Free Unsupervised Domain Adaptatio…☆15Jun 7, 2024Updated last year
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆76Oct 20, 2020Updated 5 years ago
- Anatomy-aware self-supervised learning☆11Jun 22, 2024Updated last year