heiFIP: A tool to convert network traffic into images for ML use cases
☆29Mar 27, 2026Updated last month
Alternatives and similar repositories for heiFIP
Users that are interested in heiFIP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Traffic Classification with Graph Neural Networks☆12Nov 4, 2023Updated 2 years ago
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆30Dec 27, 2024Updated last year
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆56Mar 2, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆18Jan 2, 2026Updated 3 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆134Jan 8, 2025Updated last year
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆262Jan 4, 2024Updated 2 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆25Aug 28, 2025Updated 8 months ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆38Dec 6, 2024Updated last year
- A methodology to transform a non-image data to an image for convolution neural network architecture☆33Oct 9, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- ☆22Sep 8, 2025Updated 7 months ago
- ☆10Mar 11, 2023Updated 3 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆16Jan 22, 2025Updated last year
- ☆19Mar 18, 2021Updated 5 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- Network System Intrusion Detection using Graph Neural Networks☆22Aug 1, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The use of machine learning to classify network traffic☆40Aug 28, 2020Updated 5 years ago
- This project will list the publicly available datasets in IoT domain and other resources that are required to do research in IoT domain☆32Oct 10, 2024Updated last year
- Code for our submission to IEEE CNS 2022☆26Oct 10, 2023Updated 2 years ago
- NEGSC☆48May 30, 2024Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆63Jan 7, 2025Updated last year
- ☆97Dec 14, 2024Updated last year
- This is a warehouse for MambaVision-Pytorch-model, can be used to train your image-datasets for vision tasks.☆23Jul 15, 2024Updated last year
- Implementation of Large Margin aware Focal (LMF) loss☆22Apr 24, 2025Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆30Oct 7, 2025Updated 6 months ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆51Nov 13, 2020Updated 5 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 4 years ago
- ☆41Jun 10, 2024Updated last year
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆628Nov 6, 2025Updated 5 months ago