mohammedAcheddad / AI-Based-Network-IDS_ML-DLView external linksLinks
Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine Learning (ML) and Deep Learning (DL). This project aims to develop, evaluate, and optimize intelligent models capable of accurately detecting and mitigating a wide array of network threats and anomalies.
☆54Oct 31, 2025Updated 3 months ago
Alternatives and similar repositories for AI-Based-Network-IDS_ML-DL
Users that are interested in AI-Based-Network-IDS_ML-DL are comparing it to the libraries listed below
Sorting:
- ☆22Oct 3, 2025Updated 4 months ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- ☆11Jun 22, 2025Updated 7 months ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Using ROS2, Code for px4_mavros OFFBOARD control☆13Aug 16, 2024Updated last year
- 🖱2021腾讯游戏安全技术竞赛-机器学习 4th☆11Apr 19, 2021Updated 4 years ago
- LeetCode算法题目解答☆14Nov 4, 2019Updated 6 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- ☆14May 10, 2025Updated 9 months ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- [译] 复杂性思维 中文第二版☆16Dec 24, 2020Updated 5 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- 基于SpringBoot+MyBatis+Redis的秒杀系统☆15Jan 4, 2019Updated 7 years ago
- ☆43Sep 26, 2025Updated 4 months ago
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆20Jun 11, 2023Updated 2 years ago
- [CVPR 2025 (Highlight)] ImViD: Immersive Volumetric Videos for Enhanced VR Engagement☆25Oct 22, 2025Updated 3 months ago
- Unknown protocol identification theory research and clustering experiment☆17Nov 27, 2019Updated 6 years ago
- 量子计算生成六爻卦☆18Aug 22, 2020Updated 5 years ago
- Toolkit of Python scripts for web security, network recon, login brute-forcing, and ARP spoofing experiments. Designed strictly for learn…☆27Nov 28, 2025Updated 2 months ago
- Linux安全配置规范(包含文件权限列表sudo安全配置规范),Linux安全应用指导规范 还有对于iptables、Rootkit的研究☆18Sep 16, 2018Updated 7 years ago
- libinjection-Java is a Java porting of the libinjection(http://www.client9.com/projects/libinjection/)☆20Jan 29, 2022Updated 4 years ago
- The Adaptive Radix Tree With Optimistic Synchronization.☆21Nov 15, 2018Updated 7 years ago
- ☆21Oct 30, 2020Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- ☆22Aug 15, 2019Updated 6 years ago
- [TMLR 2025] Monocular Dynamic Gaussian Splatting: Fast, Brittle, and Scene Complexity Rules☆28Aug 1, 2025Updated 6 months ago
- [CVPR 2025 Highlight] USP-Gaussian: Unifying Spike-based Image Reconstruction, Pose Correction and Gaussian Splatting☆28Jan 26, 2026Updated 2 weeks ago
- (Work In Progress) PCRE2 binding for Go☆25Dec 4, 2015Updated 10 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- Code for Stability Training with Noise (STN)☆22Dec 27, 2020Updated 5 years ago
- ☆20Jun 10, 2020Updated 5 years ago
- Flash Sculptor: Modular 3D Worlds from Objects☆33Apr 13, 2025Updated 10 months ago
- Code release for the paper "Sources of Uncertainty in 3D Scene Reconstruction"☆28Dec 10, 2024Updated last year
- 中国传媒大学网络安全本科专业课程课件☆29Feb 22, 2025Updated 11 months ago
- 个人学习记录☆29Aug 15, 2024Updated last year
- 天池大数据比赛☆25Jan 4, 2020Updated 6 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago