☆14Jun 26, 2022Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 30, 2022Updated 3 years ago
- ☆22Dec 28, 2024Updated last year
- ☆30Jun 2, 2021Updated 4 years ago
- ☆29Mar 16, 2022Updated 4 years ago
- This repository provides a reference implementation of gOCCF: Graph-Theoretic One-Class Collaborative Filtering Based on Uninteresting It…☆30Jul 17, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HMLET (Hybrid-Method-of-Linear-and-non-linEar-collaborative-filTering-method)☆30Mar 15, 2022Updated 4 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆21Dec 16, 2021Updated 4 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- Using Machine learning classifier developed GUI which takes the url of suspicious websites as input and tells the user if it is a benign …☆22Apr 11, 2021Updated 4 years ago
- ☆12Aug 20, 2023Updated 2 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- Writeups of CTFLearn Challenges , by EdbR - EladBeber☆15Feb 21, 2026Updated last month
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- This is an End-to-End Machine Learning Project which focuses on phishing websites to classify phishing and legitimate ones. Particularly,…☆33Jan 31, 2023Updated 3 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆15Jan 3, 2025Updated last year
- openssl tracer using eBPF☆16Jan 4, 2026Updated 2 months ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- Phishing detection using GNNs (SECRYPT'22)☆15Jun 6, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆16Aug 6, 2025Updated 7 months ago
- cloudflare全能加密安全代理,给你的cloudflare代理设置一个密码,避免被恶意刷流量和一些不安全的代理访问☆25Sep 30, 2024Updated last year
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆19Sep 11, 2025Updated 6 months ago
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- Official homepage for Tab-CoT: Zero-shot Tabular Chain of Thought (Findings of ACL 2023)☆33May 31, 2023Updated 2 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Addressing the problem of predicting crime occurrence based on historic records☆11Nov 27, 2019Updated 6 years ago
- ☆11Apr 14, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The official implementation of DiG-In-GNN (AAAI 2024)☆23Mar 26, 2024Updated 2 years ago
- Spectral Graph Attention Network with Fast Eigen-approximation☆12Dec 24, 2021Updated 4 years ago
- [ICLR'25] "Understanding Bottlenecks of State Space Models through the Lens of Recency and Over-smoothing" by Peihao Wang, Ruisi Cai, Yue…☆17Mar 21, 2025Updated last year
- Network sniffer in python. Sniff every incoming as well as outgoing packet. Parse the 'Ethernet', 'IP', 'TCP/UDP' & 'DNS' packets to log …☆21Oct 21, 2018Updated 7 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Source code of "IJCAI20 - Network Schema Preserving Heterogeneous Information Network Embedding"☆25Dec 8, 2020Updated 5 years ago
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆30Mar 26, 2024Updated 2 years ago