Pre-trained Online Contrastive Learning for Insurance Fraud Detection
☆12Jul 12, 2024Updated last year
Alternatives and similar repositories for POCL
Users that are interested in POCL are comparing it to the libraries listed below
Sorting:
- Interbank Risk Rating: Datasets and Methods☆23Feb 2, 2025Updated last year
- Financial time series forecasting with multi-modality graph neural network☆53Jan 14, 2024Updated 2 years ago
- Detecting fraudulent transactions on the synthetic banksim dataset with machine learning☆23Apr 2, 2023Updated 2 years ago
- Official PyTorch implementation for the paper ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection (AAAI 2024).☆29May 14, 2025Updated 9 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Awesome Graph-based Financial Fraud Detection Papers and Codes☆39Mar 17, 2025Updated 11 months ago
- Automated Continuous Data Quality Measurement☆12Nov 15, 2023Updated 2 years ago
- Использование инструмента Draw.io для создания схем Terraform развертываний.☆10Dec 18, 2025Updated 2 months ago
- PyTorch implementation of (Hinton) Knowledge Distillation and a base class for simple implementation of other distillation methods.☆29Dec 18, 2020Updated 5 years ago
- Unofficial ontologies for Official Registers of Russian Federal Tax Service☆10Apr 7, 2018Updated 7 years ago
- RemindMe is a reminder and task-management app designed to help you stay organised and on top of your to-do list.☆16Apr 5, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- Воркшоп «Agile Mindset в проектировании информационных и производственных систем» 32hrs☆13Nov 3, 2023Updated 2 years ago
- ☆10Oct 2, 2024Updated last year
- Reading comprehension based question-answering model for news articles.☆11Jun 22, 2022Updated 3 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- ☆10May 5, 2022Updated 3 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- A deep learning based application which is entitled to help the visually impaired people. The application automatically generates the tex…☆12Oct 2, 2020Updated 5 years ago
- GraphMAE2: A Decoding-Enhanced Masked Self-Supervised Graph Learner in WWW'23☆184Jul 6, 2023Updated 2 years ago
- X509 and SSH Certificate Authority☆12Apr 15, 2025Updated 10 months ago
- Manage collection of SBOMs (Software Bill of Materials)☆14Mar 25, 2024Updated last year
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- [NeurIPS 2022] Explaining Graph Neural Networks with Structure-Aware Cooperative Games (GStarX)☆14Oct 20, 2022Updated 3 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- ☆10Jun 2, 2020Updated 5 years ago
- ☆13Aug 7, 2021Updated 4 years ago
- Spring Boot Resource Server Application with Keycloak and Open Policy Agent Configuration☆11Nov 10, 2023Updated 2 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆10May 26, 2024Updated last year
- ☆10Nov 13, 2025Updated 3 months ago