zongchuanlin / Network-intrusion-detection-based-on-CNNLinks
Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.
☆66Updated 3 years ago
Alternatives and similar repositories for Network-intrusion-detection-based-on-CNN
Users that are interested in Network-intrusion-detection-based-on-CNN are comparing it to the libraries listed below
Sorting:
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆77Updated 2 years ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆26Updated 4 years ago
- use sklearn to detect two types of network attacks☆34Updated 6 years ago
- Sequential data using RNN (LSTM, GRU, etc) CNN and RCNN. Adaptable to variable length input sequence.☆61Updated 2 years ago
- ☆36Updated 5 years ago
- ☆29Updated 7 months ago
- ☆16Updated last year
- 实现了raft算法中提供的领导者选举,日志复制和持久化等功能☆36Updated 3 years ago
- A target detector designed for small target pets.☆43Updated last year
- ☆34Updated last year
- code for ICLR 2024 paper MG-TSD: Multi-Granularity Time Series Diffusion Models with Guided Learning Process☆40Updated last year
- Kevin, I., et al. "Federated Learning with Clustering-Based Participant Selection for IoT Applications." 2022 IEEE International Conferen…☆11Updated last year
- provide a new methods for the Chinese stock comment sentiment analysis☆22Updated 2 years ago
- Pattern Expansion and Consolidation on Evolving Graphs for Continual Traffic Prediction in KDD2023☆12Updated 3 months ago
- a web in masked face recognition system for undergraduate final test (本科毕设:可遮挡的人脸识别系统)☆39Updated 3 years ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆10Updated 5 months ago
- Our imbalance-aware ViT model achieves 0.91035 accuracy on the public leaderboard and 0.87750 on the private leaderboard of the ML2022Spr…☆26Updated 4 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆32Updated last year
- Source code for paper AEMTO: Evolutionary Multi-task Optimization with Adaptive Knowledge Transfer☆13Updated 3 years ago
- 2d game, the game prototype is Magic Tower☆27Updated 10 months ago
- 矿池中转指南☆35Updated 3 years ago
- mini-framework for model training and deployment☆12Updated 3 years ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆94Updated last year
- kaggle竞赛的birdclef2023已完结,小记首次参加kaggle,成绩为9%,bronze medal☆36Updated 2 years ago
- A curated collection of resources, papers, and methods related to Community Detection in complex networks☆23Updated 10 months ago
- To provide the stego community with C/C++ implementations of selected feature extractors mainly targeted at H.264 steganography.☆73Updated 4 years ago
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆28Updated last year
- 通过撤销数据对联邦学习模型的训练 更新,解决了联邦学习中的数据隐私安全问题。☆26Updated 3 months ago
- 基于keras实现的transformer☆74Updated 4 years ago
- ☆72Updated last year