CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network
☆18Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for CANTransfer
Users that are interested in CANTransfer are comparing it to the libraries listed below
Sorting:
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆21Jun 19, 2025Updated 8 months ago
- ☆16Jul 15, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- An intrusion detection system prototype for attacks on automobile CAN buses.☆22Oct 13, 2020Updated 5 years ago
- ☆20Jul 10, 2024Updated last year
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆21Dec 14, 2023Updated 2 years ago
- Modern and future vehicles are complex cyber-physical sys-tems. The connection to their outside environment raises many securityproblems …☆19Mar 11, 2021Updated 4 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- ☆21Jan 27, 2025Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- AnomalyDAE (ICASSP2020)☆52Apr 17, 2020Updated 5 years ago
- This repository hosts the code for the Metapath-based Heterogeneous Graph-Transformer Network (MHGphormer), proposed in our IEEE TCOM jou…☆38Nov 17, 2024Updated last year
- Intuitionistic Fuzzy Broad Learning System: Enhancing Robustness Against Noise and Outliers☆11Oct 26, 2025Updated 4 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 8 months ago
- Battery electric vehicle (BEV) model with a thermal management system for optimization workflows.☆13Dec 25, 2025Updated 2 months ago
- 高性能方程式赛车电池组☆10Jan 7, 2019Updated 7 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 7 months ago
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- Associate regions in a camera image with LiDAR points in 3D to calculate Time-To-Collision (TTC)☆10Jun 13, 2019Updated 6 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- ☆13Dec 5, 2022Updated 3 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago