This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).
☆23May 24, 2025Updated 10 months ago
Alternatives and similar repositories for LiM
Users that are interested in LiM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆169Apr 5, 2026Updated 2 weeks ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆69Dec 7, 2025Updated 4 months ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆31May 15, 2025Updated 11 months ago
- Materials about Encrypted Traffic Analysis☆352Mar 23, 2026Updated 3 weeks ago
- ☆19Jan 2, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 10 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆52Mar 2, 2024Updated 2 years ago
- ☆97Jan 18, 2025Updated last year
- ☆34Mar 23, 2026Updated 3 weeks ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆30Jan 26, 2025Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆147Apr 29, 2024Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- Packet Representation Learning for Traffic Classification☆35Dec 19, 2024Updated last year
- ☆11Oct 7, 2023Updated 2 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- ☆33Oct 14, 2023Updated 2 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- High-Fidelity Synthetic Network Traffic Generation☆78Sep 20, 2025Updated 7 months ago
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Jun 27, 2017Updated 8 years ago
- ☆15Apr 9, 2023Updated 3 years ago
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆625Nov 6, 2025Updated 5 months ago
- 论文Encrypted Traffic Classification with One-dimensional Convolution Neural Networks的torch实现☆40Dec 3, 2022Updated 3 years ago
- eBPF program to inject IPv6 Extension Headers on egress☆11May 11, 2024Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆166Apr 6, 2026Updated 2 weeks ago
- 隐私保护的敏感人群轨迹接触追溯算法。基于轨迹时空信息、同态加密、安全多方计算,使用C++实现☆12Oct 22, 2023Updated 2 years ago
- The official implementation of the paper "Rethinking Pruning for Vision-Language Models: Strategies for Effective Sparsity".☆16Jul 2, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Jan 2, 2026Updated 3 months ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 4 months ago
- 将大容量PCAP按流切分成小PCAP☆25Jun 6, 2023Updated 2 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆10Feb 7, 2017Updated 9 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 3 years ago
- Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3☆10Apr 27, 2020Updated 5 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago