Pinned Repositories
ai-ml-security
Potential WG on Artificial Intelligence and Machine Learning (AI/ML)
zeek_anomaly_detector
A completely automated anomaly detector Zeek network flows files (conn.log).
Algorithms_on_Feature_Engineering
The collecitons and creations of algorithms for feature engineering in machine learning
Cyber-Security-Tools
Some tools for security
Defense_Evasion_with_GAN
The project of Ransomware Detection with GAN
deploying-machine-learning-models
Example Repo for the Udemy Course "Deployment of Machine Learning Models"
InfPrd
the project using GNN to predict the influencer in social network
LogAnalyzer
Ensemble framework of some log based anomaly detection work.
logparser
A toolkit for automated log parsing [ICSE'19, TDSC'18, DSN'16]
UTLParser
Toward Unified Temporal Causal Graph Construction with Semantic Log Parser
Wapiti08's Repositories
Wapiti08/Cyber-Security-Tools
Some tools for security
Wapiti08/logparser
A toolkit for automated log parsing [ICSE'19, TDSC'18, DSN'16]
Wapiti08/Machine_Learning_Practice
the collections to practice the wide range of different machine learning skills
Wapiti08/metasploitable3-download-instructions
This is the instruction on how to download the metasploitable3 successfully
Wapiti08/GAN_Image
The research on black_box attacks to images based on GAN model
Wapiti08/Big_Data_Set_Notes
The notes to learn hadoop, spark and the other components of big data
Wapiti08/cuckoo-download-instructions
My experience on how to download the cuckoo and set the environment successfully
Wapiti08/Cust_Entity_Reco
after the sequence-labeling-BiLSTM-CRF, enhanced version
Wapiti08/DeepLearning-500-questions
深度学习500问,以问答形式对常用的概率知识、线性代数、机器学习、深度学习、计算机视觉等热点问题进行阐述,以帮助自己及有需要的读者。 全书分为18个章节,50余万字。由于水平有限,书中不妥之处恳请广大读者批评指正。 未完待续............ 如有意合作,联系scutjy2015@163.com 版权所有,违权必究 Tan 2018.06
Wapiti08/Dynamic_Programming
The achievement about typical dynamic_programming algorithms in Go
Wapiti08/effectivepython
Effective Python: Second Edition — Source Code and Errata for the Book
Wapiti08/EllipticEnvelope-Anomaly-Detection-with-Spark
The Anomaly Detection with EllipticEnvelope Method Combined with Spark
Wapiti08/fake-useragent
up to date simple useragent faker with real world database
Wapiti08/FL_tutorial
My practice on federated learning ---- part of cyber trace project
Wapiti08/Image-Identification
This is a face recognition program, which can be used to alarm
Wapiti08/Incremental-DBSCAN
Incremental version of DBSCAN for frequently changing datasets
Wapiti08/Java_Project
The practice on java classes and functions. Including Encapsulation,Inheritance and Polymorphism.
Wapiti08/Machine-Learning-for-Cybersecurity-Cookbook
Machine Learning for Cybersecurity Cookbook, published by Packt
Wapiti08/Mal_Image_Attack
the research on generating adversarial runnable malware generated by malware images
Wapiti08/Media_Website
A complete news website with Front and backend (achieved by C#)
Wapiti08/moloch
Moloch is an open source, large scale, full packet capturing, indexing, and database system.
Wapiti08/Python_Sockets
Python web programs
Wapiti08/Searching_Algorithms
The practice based on main searching algorithms with Go
Wapiti08/sequence-labeling-BiLSTM-CRF
The classical BiLSTM-CRF model implemented in Tensorflow, for sequence labeling tasks. In Vex version, everything is configurable.
Wapiti08/Software-Architecture-with-Python
Software Architecture with Python, published by Packt
Wapiti08/Spam_Detection_Research
The research on diverse spam detection
Wapiti08/SpareRooms-cn
The project will help you find the rent information when you are trying to locate a place
Wapiti08/zat
Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, and Spark