☆15Jul 26, 2022Updated 3 years ago
Alternatives and similar repositories for BAClassifier
Users that are interested in BAClassifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- ☆22Jun 20, 2024Updated last year
- Online ordering system combined with big data statistics☆10Jul 11, 2019Updated 6 years ago
- ☆13Aug 4, 2023Updated 2 years ago
- CVE List Found by Team Code4Block☆12Dec 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- The PyTorch implementation for "BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection"☆58Sep 18, 2025Updated 6 months ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- A platform for resource confirmation and infringement tracking is based on react.js and hyperledger farbic.☆11Jun 6, 2020Updated 5 years ago
- generative-camouflaged-spam-detector☆11Aug 20, 2020Updated 5 years ago
- ☆12Aug 7, 2023Updated 2 years ago
- Anomaly detection in the Ethereum network☆14Apr 17, 2022Updated 4 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- ☆11Dec 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RF^2 is a federated recommendation learning simulation framework that can simulate realistic system-induced data heterogeneity and its ef…☆13Aug 2, 2022Updated 3 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- Federated Fairness-aware Recommendation☆14Sep 2, 2022Updated 3 years ago
- ☆10Mar 31, 2022Updated 4 years ago
- [KDD 2023] Group-based Fraud Detection Network on e-Commerce Platforms☆16Feb 16, 2024Updated 2 years ago
- To mitigate position bias in LLMs, especially in long-context scenarios, we scale only one dimension of LLMs, reducing position bias and …☆11Jun 18, 2024Updated last year
- This is a crawler with a tool of Jsoup. Furthermore. Moreover, there is a python version.☆18Apr 7, 2019Updated 7 years ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆14Mar 1, 2025Updated last year
- BIC: Twitter Bot Detection with Text-Graph Interaction and Semantic Consistency☆16Nov 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security☆22Apr 25, 2023Updated 2 years ago
- Source code of FedPrompt☆16May 4, 2022Updated 3 years ago
- Official repository for WWW'24 paper "MemeCraft: Contextual and Stance-Driven Multimodal Meme Generation"☆12Jul 25, 2024Updated last year
- Source code for "RF-GNN: Random Forest Boosted Graph Neural Network for Social Bot Detection"☆17Apr 13, 2023Updated 3 years ago
- An implementation of Fraud Eagle algorithm☆19Dec 17, 2025Updated 4 months ago
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆23Nov 4, 2021Updated 4 years ago
- Official implementation of the papers "User-controlled federated matrix factorization for recommender systems" and "FedeRank: User Contro…☆18Jul 28, 2020Updated 5 years ago
- ☆18Feb 17, 2025Updated last year
- ☆17Mar 26, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Nov 18, 2024Updated last year
- Analyse environmental, social, and governance policies for potential gaps using AI - powered by LLMs, RAG techniques, and a regulatory kn…☆39Aug 3, 2025Updated 8 months ago
- A python implementation of Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network.基于图神经网络的以太坊智能合约漏洞检测方法…☆26Jul 7, 2023Updated 2 years ago
- Repository containing the official code for the paper Graph-based Modeling of Online Communities for Fake News Detection.☆22Sep 25, 2020Updated 5 years ago
- implementation of "BotPercent: Estimating Bot Populations in Twitter Communities" at EMNLP 2023, findings☆22Feb 2, 2023Updated 3 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆19Apr 27, 2022Updated 3 years ago
- Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection (TSE Accepted)☆24Aug 23, 2022Updated 3 years ago