mmamun1's repositories
dcai-course
Introduction to Data-Centric AI, MIT IAP 2023 🤖
shap
A game theoretic approach to explain the output of any machine learning model.
ydata-quality
Data Quality assessment with one line of code
adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Jbeil
[IEEE SP'24] The Official Implementation of "Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks"
DATA-CENTRIC
Lab assignments for Introduction to Data-Centric AI, MIT IAP 2024 👩🏽‍💻
CREME
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
xai-pipeline-EXP-ML
[EuroS&P 2023] XAI pipeline in Python
automated-sensitive-info-detection
This repository contains the code implementation for the paper titled "Automated detection of unstructured context-dependent sensitive information using deep learning."
text-augmentation-graph-clonal
This repository showcases a graph-based approach and the Clonal Selection Algorithm (CLONALG) for text augmentation in Natural Language Processing (NLP) tasks.
FLoBC
A Decentralized Blockchain-Based Federated Learning Framework
dowhyCausalGraph
DoWhy is a Python library for causal inference that supports explicit modeling and testing of causal assumptions. DoWhy is based on a unified language for causal inference, combining causal graphical models and potential outcomes frameworks.
dns-tunnel-dataset
DNS Tunneling Dataset
DeepC2
Implementation for paper DeepC2.
SDHAR-HOME-A-Sensor-Dataset-for-Human-Activity-Recognition-at-Home
Repository where the content of the SDHAR-HOME database is hosted, as well as the Python code to use it. Pending to be published.
CREMEv2
CREMEv2: A toolchain of automatic dataset collection for machine learning in intrusion detection based on MITRE ATT&CK
attack-flow
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
BC_Crowdshipping
This is the blockchain network of a Crowdshipping platform using Hyperledger Fabric
Drain3
Drain log template miner in Python3
MLBAC-Administration
Administration of Machine Learning Based Access Control (Implementation)
LMTracker
The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embedding
ScaleSFL
A scalable sharding solution for Blockchain based Federated Learning. SCaFL or ScaleSFL?
AzureHunter
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
handson-ml2
A series of Jupyter notebooks that walk you through the fundamentals of Machine Learning and Deep Learning in Python using Scikit-Learn, Keras and TensorFlow 2.