A Graph Neural Network-based Intrusion Detection System
☆37Aug 12, 2024Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Aug 7, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- ☆13Oct 19, 2023Updated 2 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆16Jan 22, 2025Updated last year
- Multivariate Time Series Anomaly Detection from the Perspective of Graph Relational Learning☆29Oct 30, 2022Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated last year
- ☆54Nov 11, 2021Updated 4 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆78Oct 11, 2021Updated 4 years ago
- Code repository of “Multivariate Time-Series Anomaly Detection based on Enhancing Graph Attention Networks with Topological Analysis”☆32Dec 26, 2024Updated last year
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆34Dec 18, 2022Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of GEFA: Early Fusion Approach in Drug-Target Affinity Prediction☆22Sep 30, 2020Updated 5 years ago
- 基于动态图神经网络的异常流量检测方法☆49May 23, 2023Updated 2 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- NEGSC☆48May 30, 2024Updated last year
- ☆14May 23, 2025Updated 11 months ago
- ☆20Dec 11, 2019Updated 6 years ago
- Repository for ICML2022☆17Dec 12, 2022Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- Code for ICML 2023 paper "Quantifying the Knowledge in GNNs for Reliable Distillation into MLPs"☆22Sep 24, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Jan 6, 2022Updated 4 years ago
- ☆30Dec 19, 2024Updated last year
- A Real-Time Network Intrusion Detection System based on Transformer-LSTM model (Major Project)☆16May 27, 2024Updated last year
- GPCNDTA: prediction of drug-target binding affinity through cross-attention networks augmented with graph features and pharmacophores☆17Jan 19, 2025Updated last year
- ☆11Oct 7, 2023Updated 2 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- a lightweight tool to analyse h264 and h265 raw stream.☆11Nov 13, 2024Updated last year
- Graph based Knowledge Distillation: A Survey☆69Apr 26, 2023Updated 3 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Mar 27, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆38Dec 6, 2024Updated last year
- ☆14May 1, 2023Updated 3 years ago
- Implementation, Comparison of KCF(Kernelized Correlation Filter) and DL methods for single object tracking☆15Dec 9, 2019Updated 6 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- BARE-METAL Example of the FatFs running on the SDMMC of the STM32F746G-DISCO No HAL at all... full bare-metal☆12Jun 22, 2018Updated 7 years ago
- 101 Notebooks in text classification☆15Mar 31, 2025Updated last year