☆14Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for SecFedNIDS
Users that are interested in SecFedNIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decentralized Identity☆12Dec 8, 2021Updated 4 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- ☆18Feb 5, 2025Updated last year
- 用python画出一幅标准的五星红旗,庆祝国庆节!☆11Oct 14, 2022Updated 3 years ago
- ☆19Dec 7, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆23Oct 22, 2024Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- 《华章数学译丛》☆14Feb 4, 2025Updated last year
- ☆11Apr 7, 2026Updated last week
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- 自动连接河海大学校园网☆14Jan 9, 2024Updated 2 years ago
- Simple dapp for Ethereum☆14Sep 2, 2021Updated 4 years ago
- ☆12Jun 1, 2024Updated last year
- Code of the AAAI-25 paper☆17May 13, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Basic Blockchain-Based Federated Learning Intrusion Detection System☆12Nov 2, 2022Updated 3 years ago
- A Docker-Based Federated Learning Framework Design and Deployment for Multi-modal Data Stream Classification☆13Feb 15, 2024Updated 2 years ago
- 双向身份认证系统☆10Nov 25, 2021Updated 4 years ago
- ☆15Apr 1, 2025Updated last year
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- A list of papers using/about Federated Learning especially malicious client and attacks.☆12Aug 22, 2020Updated 5 years ago
- ☆13Oct 11, 2021Updated 4 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This repository contains the official implementation of the paper entitled with "FedAPEN: Personalized Cross-silo Federated Learning with…☆14Dec 4, 2023Updated 2 years ago
- ☆13Sep 1, 2023Updated 2 years ago
- My Web Apps by Streamlit. 通过Streamlit搭建的在线应用。☆13Nov 18, 2024Updated last year
- PyTorch implementation of Fast-Convergent Federated Learning via Cyclic Aggregation, including FedAvg, FedProx, MOON, and FedRS☆15Jun 28, 2023Updated 2 years ago
- From Gradient Leakage to Adversarial Attacks in Federated Learning☆16Sep 21, 2021Updated 4 years ago
- Code for "Lightweight Blockchain-Empowered Secure and Efficient Federated Edge Learning", IEEE Transactions on Computers☆13Mar 12, 2026Updated last month
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- Gradient-Leakage Resilient Federated Learning☆14Jul 25, 2022Updated 3 years ago
- Communication-efficient federated continual learning☆20Jan 3, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆12Aug 20, 2023Updated 2 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Data for PHM 2015 data challenge☆16Sep 2, 2016Updated 9 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated 3 months ago
- Blockchain-based PKI enhancement☆11May 7, 2018Updated 7 years ago