Pre-trained Online Contrastive Learning for Insurance Fraud Detection
☆12Jul 12, 2024Updated last year
Alternatives and similar repositories for POCL
Users that are interested in POCL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Financial time series forecasting with multi-modality graph neural network☆53Jan 14, 2024Updated 2 years ago
- Awesome Graph-based Financial Fraud Detection Papers and Codes☆39Mar 17, 2025Updated last year
- [CVPR 2022 Oral] Lifelong Graph Learning (Feature Matching)☆31Mar 10, 2022Updated 4 years ago
- Temporal and Heterogeneous Graph Neural Network for Financial Time Series Prediction☆114Apr 15, 2024Updated last year
- Interbank Risk Rating: Datasets and Methods☆25Feb 2, 2025Updated last year
- CMS Medicare Fraud Detection☆23Oct 21, 2019Updated 6 years ago
- Official PyTorch implementation for the paper ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection (AAAI 2024).☆31May 14, 2025Updated 10 months ago
- Source Codes of graphSEAT (CIKM'20)☆16Jan 19, 2021Updated 5 years ago
- Source codes of F-HMTC (IJCAI'20)☆17Feb 22, 2021Updated 5 years ago
- ☆14Mar 2, 2023Updated 3 years ago
- Code for paper "Improving Generalizability of Graph Anomaly Detection Models via Data Augmentation" (TKDE 2023)☆16Dec 4, 2025Updated 3 months ago
- Toolkit for generating graphs and evaluating graph generators.☆17Oct 4, 2023Updated 2 years ago
- Interaction-Focused Anomaly Detection on Bipartite Node-and-Edge-Attributed Graphs☆16Aug 7, 2023Updated 2 years ago
- The application is a end-user training and evaluation system for standard knowledge graph embedding models. It was developed to optimise …☆18Mar 12, 2026Updated last week
- This repository contains the code used in the experimental setup of the paper 'Inductive Graph Representation Learning for Fraud Detectio…☆34May 20, 2023Updated 2 years ago
- Fall 18' Class Project for Artificial Intelligence☆20Jan 1, 2019Updated 7 years ago
- The official source code for "Class Label-aware Graph Anomaly Detection", accepted at CIKM 2023.☆17Aug 28, 2023Updated 2 years ago
- GraphMAE2: A Decoding-Enhanced Masked Self-Supervised Graph Learner in WWW'23☆185Jul 6, 2023Updated 2 years ago
- ☆19Apr 29, 2023Updated 2 years ago
- Efficient Continuous Space Policy Optimization for High-frequency Trading (DRPO)☆25Aug 18, 2023Updated 2 years ago
- ☆13Apr 3, 2023Updated 2 years ago
- ☆46Sep 12, 2022Updated 3 years ago
- ☆15Jan 5, 2023Updated 3 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 3 years ago
- a python library for cats and hypercats☆25Aug 29, 2025Updated 6 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆13Feb 25, 2024Updated 2 years ago
- ☆19Jan 16, 2022Updated 4 years ago
- The official source code for Similarity Preserving Adversarial Graph Contrastive Learning (SP-AGCL) at KDD 2023.☆23Jan 18, 2024Updated 2 years ago
- A repository for financial fraud detection☆318Jun 5, 2025Updated 9 months ago
- REPL package for Atom☆16Feb 7, 2018Updated 8 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- PyTorch implementation of (Hinton) Knowledge Distillation and a base class for simple implementation of other distillation methods.☆29Dec 18, 2020Updated 5 years ago
- Streaming Graph Neural Networks via Continual Learning (CIKM 2020)☆43Feb 18, 2021Updated 5 years ago
- A framework for transforming tabular (CSV, SQL) and hierarchical data (JSON, XML) into property graphs and ingesting them into graph data…☆28Updated this week
- ☆13Dec 5, 2022Updated 3 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago