polvalls9 / Transfer-Learning-Based-Intrusion-Detection-in-5G-and-IoT-NetworksLinks
Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the accuracy and precision of cyber-attacks detection in 5G /IoT networks with limited computing capability and datasets with scarce labeled data.
☆13Updated 3 years ago
Alternatives and similar repositories for Transfer-Learning-Based-Intrusion-Detection-in-5G-and-IoT-Networks
Users that are interested in Transfer-Learning-Based-Intrusion-Detection-in-5G-and-IoT-Networks are comparing it to the libraries listed below
Sorting:
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23Updated 3 years ago
- harshilpatel1799 / IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-LearningThe continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆52Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆46Updated 11 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Deep learning models for network intrusion detection☆39Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆14Updated 6 months ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆85Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆180Updated 2 years ago
- ☆20Updated 7 months ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Updated 6 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- ☆49Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆10Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago
- Journal Article: IEEE Access☆14Updated last year
- Attention Model for Network Intrusion Detection☆18Updated 6 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago