A PyTorch implementation of of E-GraphSAGE.
☆102Jun 30, 2022Updated 3 years ago
Alternatives and similar repositories for E-GraphSAGE
Users that are interested in E-GraphSAGE are comparing it to the libraries listed below
Sorting:
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- NEGSC☆47May 30, 2024Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- ☆12Jul 8, 2022Updated 3 years ago
- ☆19Mar 18, 2021Updated 4 years ago
- ☆21Jan 27, 2025Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆141Apr 29, 2024Updated last year
- ☆13Sep 23, 2024Updated last year
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆137Oct 30, 2023Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 4 months ago
- ☆10Jun 23, 2022Updated 3 years ago
- Implementation for paper "Link Prediction on Heterophilic Graphs via Disentangled Representation Learning"☆13Aug 26, 2022Updated 3 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Official PyTorch implementation for the paper ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection (AAAI 2024).☆29May 14, 2025Updated 9 months ago
- ☆31Oct 14, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- Flow Interaction Graph based attack traffic detection system.☆187May 6, 2024Updated last year
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- A simplified Pytorch implementation of DCRNN☆13Jul 30, 2020Updated 5 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- GAN_based_Intrusion_Detection_System_for_in-vehicle_network☆17Dec 3, 2024Updated last year