Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表
☆66Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for Conference-Accepted-Paper-List
Users that are interested in Conference-Accepted-Paper-List are comparing it to the libraries listed below
Sorting:
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆22May 24, 2025Updated 9 months ago
- Packet Representation Learning for Traffic Classification☆32Dec 19, 2024Updated last year
- ☆11Dec 23, 2024Updated last year
- A tool for simulating UART through NET☆11Jul 16, 2021Updated 4 years ago
- ☆13Oct 20, 2020Updated 5 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆137Sep 27, 2025Updated 5 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- test tcp congestion fairness on mininet☆10Aug 18, 2020Updated 5 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- ☆11Feb 22, 2024Updated 2 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated last year
- ☆15Apr 13, 2023Updated 2 years ago
- An simple smtp server☆12Nov 7, 2020Updated 5 years ago
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 4 years ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆16Feb 27, 2025Updated last year
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- ☆11May 18, 2025Updated 9 months ago
- ☆11Oct 25, 2023Updated 2 years ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 9 months ago
- A packet loss detection and location solution based on AM-PM and INT, suitable for Mininet environment, written in P4 language.☆17May 23, 2021Updated 4 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 5 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Jan 7, 2025Updated last year
- Let's build a better future with code!☆13Jan 20, 2024Updated 2 years ago
- Let Models Speak Ciphers: Multiagent Debate through Embeddings☆16Feb 17, 2024Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Code for ECML-PKDD 2022 Paper --- CMG: A Class-Mixed Generation Approach to Out-of-Distribution Detection☆12Oct 12, 2022Updated 3 years ago
- A modular framework designed for easy experimentation with optimization-based diffusion sampling algorithms.☆17Apr 9, 2025Updated 10 months ago
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆12Dec 17, 2024Updated last year
- ☆17Jul 18, 2024Updated last year
- ☆13May 15, 2022Updated 3 years ago
- Beyond Known Clusters: Probe New Prototypes for Efficient Generalized Class Discovery☆16Apr 28, 2024Updated last year
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 2 months ago
- The official implementation of AAAI'24 paper: Self-Interpretable Graph Learning with Sufficient and Necessary Explanations.☆15Jan 29, 2024Updated 2 years ago
- ☆13Feb 21, 2025Updated last year