Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine Learning (ML) and Deep Learning (DL). This project aims to develop, evaluate, and optimize intelligent models capable of accurately detecting and mitigating a wide array of network threats and anomalies.
☆58Oct 31, 2025Updated 4 months ago
Alternatives and similar repositories for AI-Based-Network-IDS_ML-DL
Users that are interested in AI-Based-Network-IDS_ML-DL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆35Dec 6, 2024Updated last year
- Wasserstein Gaussian Splatting☆17Dec 10, 2024Updated last year
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- [CVPR 2025 (Highlight)] ImViD: Immersive Volumetric Videos for Enhanced VR Engagement☆26Oct 22, 2025Updated 5 months ago
- A Go package that partially reimplements darts-clone☆12Apr 1, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pure-Go port of the PCRE2 regular expression engine.☆15Aug 5, 2023Updated 2 years ago
- 基于机器学习的DDoS入侵检测算法☆14Mar 14, 2022Updated 4 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- 🖱2021腾讯游戏安全技术竞赛-机器学习 4th☆11Apr 19, 2021Updated 4 years ago
- [TMLR 2025] Monocular Dynamic Gaussian Splatting: Fast, Brittle, and Scene Complexity Rules☆28Aug 1, 2025Updated 7 months ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE漏洞挖掘 (CVE Vulnerability Hunting), by Tr0e.☆18Jun 21, 2025Updated 9 months ago
- This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured da…☆10Feb 21, 2025Updated last year
- Flash Sculptor: Modular 3D Worlds from Objects☆33Apr 13, 2025Updated 11 months ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- 4RC: 4D Reconstruction via Conditional Querying Anytime and Anywhere☆95Feb 11, 2026Updated last month
- ArcFace pytorch☆14Dec 8, 2022Updated 3 years ago
- Code release for the paper "Sources of Uncertainty in 3D Scene Reconstruction"☆29Dec 10, 2024Updated last year
- Calculates the DCT at different frequencies in 2D☆15Nov 4, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- Code Implementation of "WorldCam: Interactive Autoregressive 3D Gaming Worlds with Camera Pose as a Unifying Geometric Representation"☆107Mar 18, 2026Updated last week
- non-standard implementation of RE2 in Go☆18Sep 29, 2015Updated 10 years ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- [CVPR 2025 Highlight] USP-Gaussian: Unifying Spike-based Image Reconstruction, Pose Correction and Gaussian Splatting☆28Jan 26, 2026Updated 2 months ago
- bug-bounty☆14Jun 5, 2023Updated 2 years ago
- An official implementation of RoDyGS: Robust Dynamic Gaussian Splatting for Casual Videos☆37Dec 11, 2024Updated last year
- The Adaptive Radix Tree With Optimistic Synchronization.☆21Nov 15, 2018Updated 7 years ago
- 基于SpringBoot+MyBatis+Redis的秒杀系统☆15Jan 4, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- Linux安全配置规范(包含文件权限列表sudo安全配置规范),Linux安全应用指导规范 还有对于iptables、Rootkit的研究☆18Sep 16, 2018Updated 7 years ago
- LeetCode算法题目解答☆14Nov 4, 2019Updated 6 years ago
- libinjection-Java is a Java porting of the libinjection(http://www.client9.com/projects/libinjection/)☆20Jan 29, 2022Updated 4 years ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆43Dec 11, 2025Updated 3 months ago
- [ICLR 2025] Where Am I and What Will I See : An Auto-Regressive Model for Spatial Localization and View Prediction☆44Aug 9, 2025Updated 7 months ago
- ☆71Nov 5, 2025Updated 4 months ago