☆21Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for FIDGAN
Users that are interested in FIDGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- This version of SDN Switch Emulator is deprecated. Please find the new version in (https://github.com/arunmir/sdn-sim3)☆14Oct 1, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Code of Anomaly Detection by Leveraging Incomplete Anomalous Knowledge with Anomaly-Aware Bidirectional GANs☆22Mar 3, 2023Updated 3 years ago
- ☆12Oct 15, 2021Updated 4 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆437Nov 12, 2020Updated 5 years ago
- We used generative adversarial networks (GANs) to do anomaly detection for time series data.☆149Jan 15, 2019Updated 7 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- AGL Documentation - Source for general documents, guides ...☆10Oct 22, 2020Updated 5 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- TensorFlow implementation of GANomaly (with MNIST dataset)☆10Dec 2, 2020Updated 5 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- ☆11Apr 7, 2026Updated last week
- detecting anomalies in hyper suprime-cam images with generative adversarial networks☆11Aug 3, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OoD Minimum Anomaly Score GAN - Code for the Paper 'OMASGAN: Out-of-Distribution Minimum Anomaly Score GAN for Sample Generation on the B…☆15Jun 3, 2021Updated 4 years ago
- MD,LSTM-AE,VAE-MAD-GAN☆31Jun 7, 2021Updated 4 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆12Nov 29, 2024Updated last year
- Using RL for anomaly detection in NSL-KDD☆124Mar 25, 2023Updated 3 years ago
- MQ-ECN NS2 Simulation☆11Feb 26, 2016Updated 10 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Supervised Learning approach to Detect Anomalies in Blockchain using Federated Learning☆34May 27, 2020Updated 5 years ago
- Reducing P4 Language’s Voluminosity using Higher-Level Constructs☆15Oct 15, 2022Updated 3 years ago
- Switch-based Training Acceleration for Machine Learning (SwitchML)☆16Apr 13, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- This repository is the PyTorch implementation of GAN Ensemble for Anomaly Detection.☆40Aug 26, 2021Updated 4 years ago
- EvoGAN: Evolutionary Algorithm based Neural Architecture Search for Generative Adversarial Networks☆10Dec 18, 2020Updated 5 years ago
- CAN Bus Voltage Dataset for the SIMPLE paper☆11Oct 2, 2019Updated 6 years ago
- 💳 Creates a new gym environment for credit-card anomaly detection using Deep Q-Networks (DQN) and leverages Open AI's Gym toolkit to all…☆19Nov 1, 2020Updated 5 years ago
- Source code to replicate the results of the paper: Time-Based CAN Intrusion Detection Benchmark, AutoSec 2021.☆10Jan 18, 2022Updated 4 years ago