noyzzz / trust_evalLinks
Generating trusted graphs for trust evaluation in online social networks
☆8Updated 3 years ago
Alternatives and similar repositories for trust_eval
Users that are interested in trust_eval are comparing it to the libraries listed below
Sorting:
- FL-based intrusion detection system development using model averaging.☆39Updated 2 years ago
- Blockchain reputation-based trust management system☆17Updated 6 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- ☆9Updated 2 years ago
- implementation of A decentralized blockchain-based authentication system for IoT☆6Updated 5 years ago
- ☆21Updated 8 months ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆125Updated 2 years ago
- ☆9Updated 2 years ago
- Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"☆23Updated 10 months ago
- ☆22Updated 3 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated last year
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆17Updated last year
- Official code for the INFOCOM 2020 paper "Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks."☆11Updated 4 years ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- An automatic packet crafting tool for evading learning-based NIDS☆81Updated 3 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆29Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆139Updated 2 years ago
- ☆15Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆33Updated 4 years ago
- ☆14Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- ☆15Updated 2 years ago
- ☆17Updated last year
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆43Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆39Updated last year