Wapiti
Wapiti08
Building and researching cyber security and machine learning technology
Languages
Loading contributions...
Top Repositories
Ensemble framework of some log based anomaly detection work.
Unified Parallel Semantic Log Parsing based on Causal Graph Construction for Attack Attribution
the project using GNN to predict the influencer in social network
labelled dataset for simulated package execution with package-analysis
The project of Ransomware Detection with GAN
The collecitons and creations of algorithms for feature engineering in machine learning
Repositories
65dependency propagation analyser on graphs
No description provided.
Unified Parallel Semantic Log Parsing based on Causal Graph Construction for Attack Attribution
Ensemble framework of some log based anomaly detection work.
Simulating Adversarial Tool Interactions in LLM Agent Pipelines
monitoring dataset for software supply chain vulnerabilities
Operational Runtime Behavior Mining for Open-Source Supply Chain Security
A WASM-based Secure Execution and Hybrid Analysis Framework for MCP Tools
No description provided.
No description provided.
labelled dataset for simulated package execution with package-analysis
PyPi package for mythic_container
The implementation of anomaly detection with Golang Deep Learning in distributed setting up
Open Source Package Analysis
The project of Ransomware Detection with GAN
Potential WG on Artificial Intelligence and Machine Learning (AI/ML)
A completely automated anomaly detector Zeek network flows files (conn.log).
Example Repo for the Udemy Course "Deployment of Machine Learning Models"
The collecitons and creations of algorithms for feature engineering in machine learning
A Graph Neural Network project on HIV data
the project using GNN to predict the influencer in social network
A toolkit for automated log parsing [ICSE'19, TDSC'18, DSN'16]
the Golang versions of Graph Theory Algorithms introduced in Udemy
the Implementation of HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis
Algorithm game involving data structure
The advanced algorithms on reduction of graph overhead
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Some experiements with Evasion Attacks
One implementation of MLOPs principle to image classification system
🎨 Python Echarts Plotting Library