Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS dataset
☆10Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for ML_project
Users that are interested in ML_project are comparing it to the libraries listed below
Sorting:
- ☆14Apr 1, 2025Updated 11 months ago
- ☆11Dec 16, 2021Updated 4 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- ☆18May 9, 2024Updated last year
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆25Nov 16, 2023Updated 2 years ago
- ☆23Aug 8, 2022Updated 3 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆21Dec 14, 2023Updated 2 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- A Concretely Efficient Hierarchical Oblivious RAM☆13Nov 6, 2023Updated 2 years ago
- Runflow is a tool to define and run workflows.☆10Jul 13, 2021Updated 4 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 2 years ago
- ☆15Apr 8, 2025Updated 10 months ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- ☆11Oct 28, 2023Updated 2 years ago
- ☆10May 26, 2024Updated last year
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 5 months ago
- ☆13Sep 23, 2024Updated last year
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- HSTGODE code☆11Nov 26, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- PUPLOOS计算机操作系统,用于操作系统入门教学☆10Apr 19, 2021Updated 4 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago