A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-shot attacks.
☆20Sep 9, 2025Updated 5 months ago
Alternatives and similar repositories for DIDS-MFL
Users that are interested in DIDS-MFL are comparing it to the libraries listed below
Sorting:
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆14Apr 1, 2025Updated 11 months ago
- ☆10Mar 11, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- ☆18Sep 8, 2025Updated 5 months ago
- ☆31Oct 14, 2023Updated 2 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- ☆16Dec 30, 2023Updated 2 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Code for KDD 2025 paper "FreRA: A Frequency-Refined Augmentation for Contrastive Learning on Time Series Classification"☆31Jun 20, 2025Updated 8 months ago
- CESNET Models: Neural networks for network traffic classification☆22Aug 18, 2025Updated 6 months ago
- ☆18May 9, 2024Updated last year
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆18Aug 3, 2023Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆18Sep 21, 2020Updated 5 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Feb 23, 2026Updated last week
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Mar 2, 2024Updated 2 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆141Apr 29, 2024Updated last year
- ☆56Sep 6, 2023Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- ☆36Jun 10, 2024Updated last year
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆55Feb 2, 2026Updated last month
- ☆37Jan 10, 2024Updated 2 years ago
- ☆90Jan 18, 2025Updated last year
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 8 months ago
- signal denoising + modulation recognition☆10Aug 7, 2018Updated 7 years ago
- ☆15Jan 14, 2025Updated last year
- ☆17Mar 22, 2025Updated 11 months ago
- Single-Source Domain Generalization for Bearing Fault Diagnosis Using Feature-Augmented Adaptive Neuro-Fuzzy Inference System☆11Apr 13, 2024Updated last year
- ☆14Jun 21, 2023Updated 2 years ago
- Public WiFi Dataset☆16Jan 23, 2024Updated 2 years ago
- ☆10Dec 3, 2023Updated 2 years ago