Stars
Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
图解计算机网络、操作系统、计算机组成、数据库,共 1000 张图 + 50 万字,破除晦涩难懂的计算机基础知识,让天下没有难懂的八股文!🚀 在线阅读:https://xiaolincoding.com
Anomaly Detection for SWaT Dataset using Sequence-to-Sequence Neural Networks
Intrusion Detection System for In-Vehicle Network
🚗 A curated list of resources for learning about vehicle security and car hacking.
ReCAN Source - Reverse engineering of Controller Area Networks - In collaboration with the Politecnico di Milano, Italy
Automated Payload Reverse Engineering Pipeline for the Controller Area Network (CAN) protocol
CNN with attention and CNN_LSTM_attention(pytorch)
Graduation Project
"Normal and Malicious Sliding Windows Similarity Analysis Method for Fast and Accurate IDS against DoS Attacks on In-Vehicle Networks" IEEE Access 2020
Code for intrusion detection system (IDS) development using CNN models and transfer learning
Interview = 简历指南 + 算法题 + 八股文 + 源码分析
Implement Time Series Prediction by Transformer Model.
A modified Transformer model for multi-horizon time series prediction with multi variables
Learning Graph Structures with Transformer for Multivariate Time Series Anomaly Detection in IoT
CNN+BiLSTM+Attention Multivariate Time Series Prediction implemented by Keras
Multivariate Time Series Transformer, public version
Unsupervised Scalable Representation Learning for Multivariate Time Series: Experiments
The GitHub repository for the paper "Informer" accepted by AAAI 2021.
Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.
基于机器学习的入侵检测系统
基于Visual C++开发,用于模拟发送公交车的CAN总线数据,以进行车载物联网系统测试。