☆19Mar 18, 2021Updated 4 years ago
Alternatives and similar repositories for PBCNN
Users that are interested in PBCNN are comparing it to the libraries listed below
Sorting:
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- ☆18May 9, 2024Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- Implementation of Large Margin aware Focal (LMF) loss☆23Apr 24, 2025Updated 10 months ago
- ☆24Nov 9, 2020Updated 5 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 8 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Implementation of the paper: "FinDiff: Diffusion Models for Financial Tabular Data Generation"☆34Aug 4, 2024Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- ☆10Nov 15, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- configure different congestion control algorithms☆10Jun 14, 2021Updated 4 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This MATLAB code implements the binary Grass hopper optimization algorithm to select the features and train with KNN☆12Apr 3, 2019Updated 6 years ago
- A reliable mobile-web template built on Vue, Vue-CLI, Vuex, Vue-Router, Vant, Axios, Scss, Mock, Eslint and Viewport adaptation scheme. 基…☆15Jul 26, 2021Updated 4 years ago
- NEGSC☆47May 30, 2024Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆103Jun 30, 2022Updated 3 years ago
- Deep SNNs with various neural coding methods (rate, phase, burst, TTFS)☆12Feb 15, 2022Updated 4 years ago
- Replication code for Continuous Diffusion for Mixed-Type Tabular Data [ICLR 2025]☆12Aug 12, 2025Updated 6 months ago
- ☆10Nov 13, 2025Updated 3 months ago
- ☆10May 26, 2024Updated last year
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- Xilinx Blockchain Machine for Hyperledger Fabric.☆14Oct 30, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago