Stars
[ICLR 2024] Official implementation of " 🦙 Time-LLM: Time Series Forecasting by Reprogramming Large Language Models"
A dataset repository of "Accurate Action Recommendation for Smart Home via Two-Level Encoders and Commonsense Knowledge" (CIKM 2022)
A unified, comprehensive and efficient recommendation library
Author: Daheng Wang (dwang8@nd.edu). KDD'20. Modeling temporal graphs.
NeCSTGen: An approach For Realistic Network Traffic Generation Using Deep Learning
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask, SIGKDD 2024
TAPFixer is an automatic vulnerability detection and repair framework for TAP-based home automation systems. It can model TAP rules with practical latency and physical features to capture the accur…
Wireshark plugin for parsing Matter protocol messages. Status: Experimental
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
(SIGCOMM '22) Practical GAN-based Synthetic IP Header Trace Generation using NetShare
[IMC 2020 (Best Paper Finalist)] Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence
TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference. Published at the 10th IEEE Conference on Communications and Network Security (IEEE CNS 2022).
Pcap editing and replay tools for *NIX and Windows - Users please download source from
ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution
Privacy enhancing ML-based traffic perturbation generator for IoT devices
s2labs / 2023_Distributed-Device-Specific-Anomaly-Detection-for-Resource-Constrained-Devices
Forked from s2labs/2023_Distributed-Device-Specific-Anomaly-Detection-using-Deep-Feed-Forward-Neural-NetworksCode for the 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS) Paper: Distributed Device-Specific Anomaly Detection for Resource-Constrained Devices
With over 150 supervised theses, we have some guidelines at hand that can help you, writing a good thesis document.