detect malicious URL and Request (Bi-LSTM、Bi-LSTM + CNN、CNN + Bi-LSTM、CNN + Bi-LSTM + CNN)
☆60Mar 18, 2019Updated 6 years ago
Alternatives and similar repositories for detect-lstm-model
Users that are interested in detect-lstm-model are comparing it to the libraries listed below
Sorting:
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Guiding Entity Alignment via Adversarial Knowledge Embedding☆16Oct 21, 2020Updated 5 years ago
- Predicting Weather using CNN-LSTM☆69Apr 9, 2020Updated 5 years ago
- Code for the case study presented in "Making a Case for Federated Learning in the Internet of Vehicles and Intelligent Transportation Sys…☆27Apr 9, 2021Updated 4 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Multi-cell compositional LSTM for NER domain adaptation, code for ACL 2020 paper☆29Dec 2, 2020Updated 5 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Final year project☆11Jun 3, 2020Updated 5 years ago
- Implementation of Dynamic Computation Offloading Control Logic in a Software-Defined Vehicle (SDV) System☆11Dec 19, 2024Updated last year
- ☆10Dec 10, 2021Updated 4 years ago
- a Federated Learning Framework adapted for resource-constrained environments, focusing on IoT devices☆10Oct 6, 2025Updated 5 months ago
- gmx_corr converts the covariance matrix which is produced by GROMACS covar to cross correlation matrix and creates a heat map figure.☆11Oct 11, 2022Updated 3 years ago
- ☆10Dec 21, 2022Updated 3 years ago
- papers about recommender system.☆10May 18, 2021Updated 4 years ago
- [PAKDD2023] Improving Knowledge Graph Entity Alignment with Graph Augmentation☆11Nov 16, 2023Updated 2 years ago
- Hierarchical BiLSTM CNN using Keras☆78Apr 15, 2018Updated 7 years ago
- My undergraduate final project - Modeling and control of a distillation column using neural networks and reinforcement learning.☆12Apr 28, 2020Updated 5 years ago
- Protect workers with TensorFlow Hard Hat object detection model on a Jetson Nano☆10Sep 27, 2022Updated 3 years ago
- Thesis in Federated Learning using an Edge/Cloud Computing architecture☆10Feb 26, 2021Updated 5 years ago
- Predict remaining useful life of a machine from it's historical data using CNN and LSTM☆34May 6, 2019Updated 6 years ago
- 文本生成(Word2Vec + RNN/LSTM)☆36Jul 1, 2018Updated 7 years ago
- Math24o: 高中奥林匹克数学竞赛测评集 High School Olympiad Mathematics Chinese Benchmark☆11Mar 27, 2025Updated 11 months ago
- Simple model for sentence compression (a.k.a Baseline in Klerke et al., NAACL 2016)☆10Dec 16, 2018Updated 7 years ago
- An HTTP client for the Rust AWS SDK that runs on Fastly Compute @ Edge☆10Nov 11, 2025Updated 3 months ago
- ☆10May 1, 2020Updated 5 years ago
- Source code for "Congestion-aware Distributed Task Offloading in Wireless Multi-hop Networks Using Graph Neural Networks"☆14Oct 23, 2024Updated last year
- This is a DQN-based recommendation system for item-list recommendation and it finally achieved second place in the competition of RL-base…☆11Oct 8, 2021Updated 4 years ago
- Implementation of NAACL'19 Strong and Simple Baselines for Multimodal Utterance Embeddings☆10Jun 4, 2019Updated 6 years ago
- Reinforcement learning project using deep Q-learning to control the operations of an electrical microgrid☆10Jan 3, 2023Updated 3 years ago
- Simplify mainframe application deployments using Ansible☆11Jun 18, 2021Updated 4 years ago
- My documented journey to learning fastapi☆11Apr 30, 2023Updated 2 years ago
- Deep Reinforcement Learning based Autonomous Driving Agents☆10Jul 7, 2022Updated 3 years ago
- ☆11Jan 11, 2022Updated 4 years ago
- Official implementation of the UMDQN algorithm presented in the scientific research paper entitled "Distributional Reinforcement Learning…☆11Jun 3, 2022Updated 3 years ago
- ☆10Jul 26, 2024Updated last year
- This operator will manage and configure data processing unit (DPUs) to be used in accelerating/offloading k8s networking functions☆12Feb 13, 2026Updated 3 weeks ago
- [ICML 2024 Oral] Consistent Adversarial Robust Deep Q Networks (CAR-DQN)☆15Feb 27, 2025Updated last year
- 1、基于gensim的word2vec模型的训练 2、基于skip_gram模型的词向量模型的训练 3、词向量模型的评估(近义词、反义词) 4、兼容基于gensim的word2vec模型的训练、基于skip_gram模型的词向量模型的训练的增量模型的训练 5、转换词向量☆10Jul 1, 2020Updated 5 years ago
- SIEM, Visibility, and Event-Driven Architecture Curated Solutions. Build a cost-effective threat detection and log management system.☆18Jan 17, 2024Updated 2 years ago