This repository contains the dataset developed in paper, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles."
☆21Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for UAVs-Dataset-Under-Normal-and-Cyberattacks
Users that are interested in UAVs-Dataset-Under-Normal-and-Cyberattacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- This repository is the for Multi-UAVs optimization for path planning with the area priority☆17Feb 2, 2024Updated 2 years ago
- An implementation of flocking behavior in Unity (new and improved!)☆10Jan 4, 2020Updated 6 years ago
- ☆10May 30, 2025Updated 9 months ago
- ☆19Jul 9, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 7 months ago
- Clone of Ian M. Mitchell's ToolboxLS repository. (https://bitbucket.org/ian_mitchell/toolboxls)☆14Jan 18, 2020Updated 6 years ago
- This is repository contains the code of the paper, "UAVs path planning by particle swarm optimization based on visual-SLAM algorithm"☆33Feb 2, 2024Updated 2 years ago
- Meta graph convolutional neural network-assisted resilient swarm communications☆77Nov 24, 2023Updated 2 years ago
- ☆16May 7, 2019Updated 6 years ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆16Mar 22, 2026Updated last week
- (b)ash script using curl for duodian Internet login in Chongqing University☆12Mar 27, 2022Updated 4 years ago
- A python program to minimize any given DFA☆13Mar 25, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- All the details for our UAVs Jammming Detection project☆12Feb 20, 2023Updated 3 years ago
- This is my MPPT project I am doing for a solar boat racing application called the DieBieMPPT☆17Nov 25, 2017Updated 8 years ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated last year
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- ☆15Jan 7, 2023Updated 3 years ago
- Ardusim. Accurate and real-time multi-UAV simulation☆15Nov 28, 2022Updated 3 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- PyTrafficSim is a light traffic simulator for research related purposes. PTS is the most easy way to test your self-driving algorithm wit…☆20Mar 6, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Spatiotemporal propagation network for airport delay prediction☆21Mar 9, 2023Updated 3 years ago
- Pytorch implementation of paper: Small Pre-trained Language Models Can be Fine-tuned as Large Models via Over-Parameterization.☆12May 18, 2023Updated 2 years ago
- using yolov5 to detect whether people fall down or not☆11May 9, 2023Updated 2 years ago
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆12Jun 18, 2019Updated 6 years ago
- A Python package with integrated lncRNA prediction methods☆13Feb 17, 2021Updated 5 years ago
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆15Feb 25, 2023Updated 3 years ago
- Codes for paper "An Embedding Approach to Anomaly Detection."☆13Dec 13, 2018Updated 7 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆15Oct 29, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- Télécom Paris | MS Big Data | SD 701 | Big Data Mining Course Project using Spark and Google Colab for building Scalable Recommender Syst…☆21May 21, 2023Updated 2 years ago
- Self-Distillation with weighted ground-truth targets; ResNet and Kernel Ridge Regression☆19Oct 12, 2021Updated 4 years ago
- Caffe/Neon prototxt training file for our Neurocomputing2017 work: Fuzzy Quantitative Deep Compression Network☆12May 30, 2018Updated 7 years ago
- Normalized Wasserstein for Mixture Distributions☆11Mar 24, 2023Updated 3 years ago
- UAV Network Communication Experimental dataset is a collection of network traffic captured from a wireless network used by unmanned aeria…☆30May 14, 2023Updated 2 years ago