code for infocom 2021 paper MANDA
☆11May 30, 2023Updated 2 years ago
Alternatives and similar repositories for manda
Users that are interested in manda are comparing it to the libraries listed below
Sorting:
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection☆28Jan 17, 2024Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- ☆18Jan 25, 2025Updated last year
- ☆17Nov 14, 2025Updated 4 months ago
- There are my Pytorch codes for charactering adversarial subspace using local intrinsic dimensionality.☆13Apr 26, 2022Updated 3 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- ☆16Oct 18, 2023Updated 2 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- 北京邮电大学学士学位论文Word模板☆18Oct 8, 2024Updated last year
- Evolutionary decision trees☆11Jun 16, 2025Updated 9 months ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- ☆18Mar 30, 2025Updated 11 months ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- [USENIX Security '25] My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers☆38Aug 22, 2025Updated 7 months ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- ☆12Oct 17, 2022Updated 3 years ago
- Jigsaw puzzle solver☆13Apr 26, 2020Updated 5 years ago
- SDN NFV architecture for DDoS mitigation with reinforcement learning: An implementation with ONOS and Containernet☆10Sep 1, 2024Updated last year
- Convolutional Neural Network Based Optimization Approach for Wireless Resource Management☆10Apr 7, 2021Updated 4 years ago
- Online Service Function Chain Deployment for Live-Video virtualized Content Delivery Networks, a Deep Reinforcement Learning approach pap…☆10Nov 8, 2021Updated 4 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- Courses in UCAS☆14Jun 12, 2023Updated 2 years ago
- Paper collection of next-generation network resource allocation by machine learning☆11Mar 18, 2020Updated 6 years ago
- TT-Studio : An all-in-one platform to deploy and manage AI models optimized for Tenstorrent hardware with dedicated front-end demo applic…☆40Updated this week
- Framework App driven☆10Jun 5, 2025Updated 9 months ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- ☆11Apr 21, 2021Updated 4 years ago
- code space of paper "Safety Layers in Aligned Large Language Models: The Key to LLM Security" (ICLR 2025)☆22Apr 26, 2025Updated 10 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- ☆13Mar 24, 2017Updated 8 years ago
- A new framework to generate interpretable classification rules☆18Feb 11, 2023Updated 3 years ago
- [ICLR 2026] The implementation of paper "AlphaSteer: Learning Refusal Steering with Principled Null-Space Constraint"☆43Nov 20, 2025Updated 4 months ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago