This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust autoencoder.
☆19Mar 24, 2023Updated 2 years ago
Alternatives and similar repositories for Salehi_submitted_2020
Users that are interested in Salehi_submitted_2020 are comparing it to the libraries listed below
Sorting:
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Mar 14, 2022Updated 3 years ago
- Code for the CVPR 2020 paper 'Old is Gold: Redefining the Adversarially Learned One-Class Classifier Training Paradigm'☆90Mar 5, 2021Updated 5 years ago
- Unsupervised Anomaly Detection and Segmentation via Deep Feature Correspondence☆21Nov 30, 2022Updated 3 years ago
- ☆25Oct 6, 2019Updated 6 years ago
- ☆56Apr 19, 2021Updated 4 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- A simple and effective method for single-class classification of images☆161Nov 29, 2021Updated 4 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- Let's play with digital holograms☆11Jul 4, 2021Updated 4 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆13Sep 23, 2024Updated last year
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- Multivariate distributions for hyperspectral anomaly detection based on autoencoder☆11Jan 26, 2022Updated 4 years ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- ☆12Jan 13, 2022Updated 4 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 4 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- A pytorch version PhysenNet (seems fine)☆12Apr 14, 2022Updated 3 years ago
- Just a demonstration of some sampling techniques (rejection sampling, importance sampling, sampling importance resampling, Metropolis sam…☆11Aug 24, 2013Updated 12 years ago
- This repository provides a MATLAB code for the Weight Quadrant Scan Method. This method allows transitions or boundaries detection from m…☆12Jan 30, 2019Updated 7 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- Official repository of the paper "Understanding the decisions of CNNs: an in-model approach"☆10Sep 7, 2021Updated 4 years ago
- TensorFlow implementation of GANomaly (with MNIST dataset)☆10Dec 2, 2020Updated 5 years ago
- ☆10Nov 13, 2025Updated 3 months ago