Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for dataset attack
attack
x
dataset
x
49 search results found
Textattack
⭐
2,597
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Attack_data
⭐
482
A repository of curated datasets from various attacks
Botsv2
⭐
286
Splunk Boss of the SOC version 2 dataset.
Hai
⭐
97
HIL-based Augmented ICS (HAI) Security Dataset
Elk Detection Lab
⭐
94
An ELK environment containing interesting security datasets.
Lucid Ddos
⭐
73
A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Badnets Pytorch
⭐
70
Simple PyTorch implementations of Badnets on MNIST and CIFAR10.
Id2t
⭐
42
Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.
Ddosflowgen
⭐
40
Simulate DDoS attacks and generate traffic datasets
Badnets
⭐
36
Mdl Stance Robustness
⭐
31
Multi-dataset stance detection and robustness experiments
Attentive Filtering Network
⭐
29
University of Edinbrugh-Johns Hopkins University's system for ASVspoof 2017 Version 2.0 dataset.
Transferability Advdnn Pub
⭐
29
Public repo for transferability ICLR 2017 paper
Bob.paper.icb2019.gradgpad
⭐
26
Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal
Autozoom Attack
⭐
25
Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks” , published at AAAI 2019
Nslkdd Dataset
⭐
24
NSLKDD Dataset for WEKA
Adversarial Examples
⭐
23
Adversarial Examples: Attacks and Defenses for Deep Learning
Tf
⭐
23
The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper
Dfst
⭐
23
This is the repository for DFST paper Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Data Poisoning Release
⭐
23
Hybrid Attack
⭐
22
Graph Universal Attack
⭐
18
Probingdataset
⭐
16
Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan
Intrusion Detection Big Data
⭐
15
Wfes
⭐
15
A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses" (Cherubin, 2017)
Hard Label Attack
⭐
14
Natural Language Attacks in a Hard Label Black Box Setting.
K Fp
⭐
14
Benchmarks for the k-FP WF attack
Translearn
⭐
14
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Speaker Anti Spoofing Classifiers
⭐
14
Baselines and Classifiers for speaker anti-spoofing detection
Adverserial_attack
⭐
12
Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset
Convexpolytopeposioning
⭐
12
ConvexPolytopePosioning
Cmpt980
⭐
11
This repo provides the code for the CMPT980 course project (DDoS detection and identification using ML)
Bayesian Adversarial Learning
⭐
11
Network Log And Traffic Analysis
⭐
11
Identify malicious behavior and attacks using Machine Learning with Python
Sever
⭐
11
[ICML 2019] A Robust Meta-Algorithm for Stochastic Optimization
Fdia Pdm
⭐
10
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Xanthus
⭐
9
System traces dataset generation tool.
Sada
⭐
9
SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications (AAAI 2020)
Modelbiasedattack
⭐
9
Tik_tok
⭐
9
This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in PETS 2020.
Spectre Real Time Detection
⭐
8
This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)
Data Poisoning Journal Release
⭐
8
Sbustreamspot Data
⭐
8
Datasets used in the StreamSpot experiments
Model Targeted Poisoning
⭐
8
code for model-targeted poisoning
Vnondb Extractor
⭐
8
VNOnDB dataset extractor. This dataset can be use for build deep learning model to attack vietnamese handwritten text recognition problem.
Fda
⭐
7
Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq
Adversarialmachinelearning_comp551
⭐
7
Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifiers and the possible ways to prevent such attacks.
Adversarial Sentiment Classification
⭐
7
Adversarial attack on sentiment classification task.
Datasouls_antispoof
⭐
6
Code and pre-trained models for detecting spoofing attacks from images.
Pakistan Suicide Bombing Dataset
⭐
6
Analyzing the Suicide Bombing Patterns and seeking some of the most tangled questions with good visualizations with the help of Machine Learning and Data Science.
Pokemon
⭐
6
R analysis on the Pokemon data
Global Terrorism Database K Means
⭐
5
A visualization of k-means clustering on terrorist attack locations
Gan Balancing Datasets
⭐
5
COSC 490 Towson University
Httpparamsdataset
⭐
5
Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.
Datasets
⭐
5
COMNETS lab dataset is a collection of datasets from the Department of Computer Engineering. Faculty of Computer Science. Universitas Sriwijaya.
Attack Technique Dataset
⭐
5
A dataset containing APT group related articles and MITRE ATT&CK technique descriptions
Apache Http Logs
⭐
5
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
Related Searches
Python Dataset (14,792)
Jupyter Notebook Dataset (6,824)
Deep Learning Dataset (2,364)
Python Attack (2,303)
Machine Learning Dataset (2,279)
Dataset Pytorch (1,847)
Dataset Tensorflow (1,583)
Dataset Classification (1,500)
Dataset Convolutional Neural Networks (1,264)
Dataset Paper (1,252)
1-49 of 49 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.