This repository contains the dataset developed in paper, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles."
☆24Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for UAVs-Dataset-Under-Normal-and-Cyberattacks
Users that are interested in UAVs-Dataset-Under-Normal-and-Cyberattacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- This repository is the for Multi-UAVs optimization for path planning with the area priority☆17Feb 2, 2024Updated 2 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 8 months ago
- This is repository contains the code of the paper, "UAVs path planning by particle swarm optimization based on visual-SLAM algorithm"☆34Feb 2, 2024Updated 2 years ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- (b)ash script using curl for duodian Internet login in Chongqing University☆12Mar 27, 2022Updated 4 years ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated last year
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- Pytorch implementation of paper: Small Pre-trained Language Models Can be Fine-tuned as Large Models via Over-Parameterization.☆12May 18, 2023Updated 2 years ago
- using yolov5 to detect whether people fall down or not☆11May 9, 2023Updated 3 years ago
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆12Jun 18, 2019Updated 6 years ago
- Codes for paper "An Embedding Approach to Anomaly Detection."☆13Dec 13, 2018Updated 7 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆15Oct 29, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- Self-Distillation with weighted ground-truth targets; ResNet and Kernel Ridge Regression☆19Oct 12, 2021Updated 4 years ago
- Normalized Wasserstein for Mixture Distributions☆11Mar 24, 2023Updated 3 years ago
- A Python module for mapping multiple high-dimensional datasets into a common low-dimensional space.☆10Mar 29, 2018Updated 8 years ago
- ☆11Nov 11, 2019Updated 6 years ago
- Implementation of the famous Camera Noise Fingerprint "NoisePrint" in Pytorch☆17Nov 18, 2023Updated 2 years ago
- ☆11Oct 17, 2024Updated last year
- Resources for the GPS spoofing detection project☆12Apr 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official implementation for paper "FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning" (NeurIPS 2023).☆13Oct 25, 2024Updated last year
- POC for CVE-2023-38646☆20Dec 7, 2023Updated 2 years ago
- IEEE TVCG Visual Analytics in Deep Learning Survey☆19Feb 11, 2021Updated 5 years ago
- Extract camera fingerprint using different types of state-of-the-art denoisers☆22Jun 16, 2022Updated 3 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- The Java Package of NLPIR-ICTCLAS.☆19Sep 11, 2017Updated 8 years ago
- Text2Graph model trained with T5 (Similar to GraphGPT)☆21May 24, 2023Updated 2 years ago
- TensorFlow implementation of EncDec-AD model for multivariate time series anomaly detection with LSTM-based encoder-decoder.