taerikkk / BPELinks
☆13Updated 3 years ago
Alternatives and similar repositories for BPE
Users that are interested in BPE are comparing it to the libraries listed below
Sorting:
- ☆11Updated 3 years ago
- ☆25Updated last year
- ☆12Updated 3 years ago
- Passive DNS Dataset of Domain Resolutions☆18Updated 3 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- ☆6Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆19Updated 6 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 11 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 5 years ago
- ☆54Updated last year
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Updated 5 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 6 months ago
- ☆25Updated 8 months ago
- Implementation of Adversarial Privacy Graph Embedding in TensorFlow☆20Updated 5 years ago
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆19Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆28Updated 3 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- A tunneled flooding traffic detection system.☆24Updated 6 months ago
- [AAAI 2023] Official PyTorch implementation for "Untargeted Attack against Federated Recommendation Systems via Poisonous Item Embeddings…☆22Updated 2 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated 2 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆21Updated 3 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆16Updated 3 years ago
- ☆16Updated 3 years ago
- ☆13Updated 9 months ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆14Updated 2 months ago