zongchuanlin / Network-intrusion-detection-based-on-CNN
Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.
☆58Updated 2 years ago
Alternatives and similar repositories for Network-intrusion-detection-based-on-CNN:
Users that are interested in Network-intrusion-detection-based-on-CNN are comparing it to the libraries listed below
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆69Updated last year
- use sklearn to detect two types of network attacks☆31Updated 5 years ago
- ☆38Updated 4 years ago
- ☆17Updated 2 months ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆22Updated 4 years ago
- A framework for implementing federated learning☆32Updated 3 years ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆8Updated this week
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆25Updated 9 months ago
- Practical Detection of Trojan Neural Networks☆117Updated 4 years ago
- ☆74Updated 2 months ago
- code for ICLR 2024 paper MG-TSD: Multi-Granularity Time Series Diffusion Models with Guided Learning Process☆38Updated 10 months ago
- 矿池中转指南☆34Updated 2 years ago
- A benchmark for logging statement generation.☆18Updated 2 months ago
- ASK-Attack and ASK-Defense☆39Updated 2 years ago
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆15Updated last year
- 暨南大学健康打卡(时代的产物) 支持过滑动模块以及拼图模块☆5Updated 2 years ago
- ☆76Updated last month
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆23Updated 6 months ago
- Generative Exploration and Exploitation☆25Updated 3 years ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- ☆14Updated 2 weeks ago
- ☆28Updated 4 years ago
- ☆11Updated 7 months ago
- Kevin, I., et al. "Federated Learning with Clustering-Based Participant Selection for IoT Applications." 2022 IEEE International Conferen…☆11Updated 5 months ago
- 2d game, a birthday present for my girl friend, the game prototype is Magic Tower☆27Updated last month
- DGDATA: Deep Generative Domain Adaptation with Temporal Relation Attention Mechanism for Cross-User Activity Recognition☆7Updated 5 months ago
- provide a new methods for the Chinese stock comment sentiment analysis☆23Updated 2 years ago