liujie40's repositories
ADBench
Official Implement of "ADBench: Anomaly Detection Benchmark".
AI-for-Time-Series-Papers-Tutorials-Surveys
A professional list of Papers, Tutorials, and Surveys on AI for Time Series in top AI conferences and journals.
APT-KGL
APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning
awesome-AI-for-time-series-papers
A professional list of Papers, Tutorials, and Surveys on AI for Time Series in top AI conferences and journals.
Awesome-Deep-Graph-Anomaly-Detection
Awesome graph anomaly detection techniques built based on deep learning frameworks. Collections of commonly used datasets, papers as well as implementations are listed in this github repository. We also invite researchers interested in anomaly detection, graph representation learning, and graph anomaly detection to join this project as contributors and boost further research in this area.
data_sciences_campaign
【数据科学家系列课程】
deep-iforest
implementation of deep isolation forest for anomaly detection
DeTTECT
Detect Tactics, Techniques & Combat Threats
gatv3-SBM-training
Training code for GATv3 SBM
GEE
Pytorch implementation of GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection
Graph-Anomaly-Loss
TNNLS: A Synergistic Approach for Graph Anomaly Detection with Pattern Mining and Feature Learning; CIKM'20: Error-bounded Graph Anomaly Loss for GNNs.
graph-data-augmentation-papers
A curated list of graph data augmentation papers.
mdistiller
The official implementation of [CVPR2022] Decoupled Knowledge Distillation https://arxiv.org/abs/2203.08679
ML4Cyber2022
Code used for ML4Cyber2022 publication
MultilayerBlockModels
Code associated with our paper "Multilayer Block Models for Exploratory Analysis of Computer Event Logs".
NLP4CyberSecurity
NLP model and tech for cyber security tasks
nulog
"Self-supervised Log Parsing" submitted for review at ECML-PKDD 2020
OpenHINE
An Open-Source Toolkit for Heterogeneous Information Network Embedding (HINE)
PhishIntention
PhishIntention: Phishing detection through webpage intention
PLELog
Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.
prov2vec
An end-to-end system that utilizes representation learning on provenance graph in order to detect the compromised hosts and users.
pyMIDAS
Python implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams
record_what_i_read
AI Model Security Reading Notes
ShadeWatcher
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22
TabSurvey
Experiments on Tabular Data Models
TranAD
[VLDB'22] Anomaly Detection using Transformers, self-conditioning and adversarial training.
ustcthesis
LaTeX template for USTC thesis
Zircolite
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs