oyoycr / Conference-Accepted-Paper-ListView external linksLinks
Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表
☆61Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for Conference-Accepted-Paper-List
Users that are interested in Conference-Accepted-Paper-List are comparing it to the libraries listed below
Sorting:
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆21May 24, 2025Updated 8 months ago
- ☆31Oct 15, 2025Updated 3 months ago
- ☆11Dec 23, 2024Updated last year
- A curation of awesome papers, datasets and tools about network traffic analysis.☆136Sep 27, 2025Updated 4 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 8 months ago
- test tcp congestion fairness on mininet☆10Aug 18, 2020Updated 5 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated last year
- ☆11Dec 26, 2024Updated last year
- AI算命☆11Jan 9, 2024Updated 2 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated 11 months ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- ☆15Apr 13, 2023Updated 2 years ago
- An simple smtp server☆12Nov 7, 2020Updated 5 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Sep 18, 2025Updated 4 months ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- 基于神经网络的 PHP webshell检测器,目前有Attention与LSTM两种网络结构,以OPCODE作特征基础☆11Nov 28, 2019Updated 6 years ago
- Code for ECML-PKDD 2022 Paper --- CMG: A Class-Mixed Generation Approach to Out-of-Distribution Detection☆12Oct 12, 2022Updated 3 years ago
- Let Models Speak Ciphers: Multiagent Debate through Embeddings☆16Feb 17, 2024Updated last year
- Huggingface PPO Demo☆19Sep 7, 2025Updated 5 months ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 9 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Jan 7, 2025Updated last year
- ☆13Jun 8, 2024Updated last year
- ☆14Jan 4, 2025Updated last year
- ☆17Jul 18, 2024Updated last year
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆12Dec 17, 2024Updated last year
- A modular framework designed for easy experimentation with optimization-based diffusion sampling algorithms.☆17Apr 9, 2025Updated 10 months ago
- A packet loss detection and location solution based on AM-PM and INT, suitable for Mininet environment, written in P4 language.☆17May 23, 2021Updated 4 years ago
- Beyond Known Clusters: Probe New Prototypes for Efficient Generalized Class Discovery☆16Apr 28, 2024Updated last year
- 按照会话解包, 然后提取明文txt信息, 让ChatGPT来判断一下是否存在攻击行为☆14Mar 7, 2023Updated 2 years ago
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Nov 19, 2021Updated 4 years ago
- ☆17Aug 30, 2024Updated last year
- ☆13Feb 21, 2025Updated 11 months ago
- A collection of important papers on Generalizable Diffusion-generated Image Detection☆17Mar 20, 2025Updated 10 months ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 5 months ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated last month