zhenlus / GNN-IDSView external linksLinks
A Graph Neural Network-based Intrusion Detection System
☆30Aug 12, 2024Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below
Sorting:
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆41Apr 17, 2025Updated 9 months ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆35Mar 3, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆24Nov 16, 2023Updated 2 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- ☆53Nov 11, 2021Updated 4 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- Code repository of “Multivariate Time-Series Anomaly Detection based on Enhancing Graph Attention Networks with Topological Analysis”☆31Dec 26, 2024Updated last year
- Multivariate Time Series Anomaly Detection from the Perspective of Graph Relational Learning☆28Oct 30, 2022Updated 3 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- ☆18Jul 17, 2025Updated 6 months ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- ☆14Apr 1, 2025Updated 10 months ago
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- This is a MATLAB-SIMULINK-based model to study the effects of partial shading on PV array characteristics.☆11May 27, 2020Updated 5 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- BARE-METAL Example of the FatFs running on the SDMMC of the STM32F746G-DISCO No HAL at all... full bare-metal☆11Jun 22, 2018Updated 7 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- ☆11Oct 28, 2023Updated 2 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- 基于强化学习的异构感知高能效联邦学习调度系统☆14Apr 13, 2024Updated last year
- ☆11Oct 7, 2023Updated 2 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- Another Wheel to parse json☆11Mar 13, 2020Updated 5 years ago
- Secure and Scalable Federated Learning using Serverless Computing☆12Jan 31, 2024Updated 2 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- ☆14Feb 26, 2025Updated 11 months ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago