multi-label classification on DBLP dataset with DeepWalk algorithm to extract latent dimension
☆13Jan 17, 2015Updated 11 years ago
Alternatives and similar repositories for DBLP
Users that are interested in DBLP are comparing it to the libraries listed below
Sorting:
- Neural-based Noise Filtering from Word Embeddings☆11Apr 29, 2017Updated 8 years ago
- Analyze and search a dataset of academic paper citation relationships from the DBLP Computer Science Bibliography.☆23Dec 10, 2013Updated 12 years ago
- Official implementation of the paper: Enhancing the Transferability of Adversarial Point Clouds by Initializing Transferable Adversarial …☆29Apr 1, 2025Updated 11 months ago
- Semantic Preserving Embeddings for Generalized Graphs☆31Nov 14, 2018Updated 7 years ago
- ☆30Jul 25, 2018Updated 7 years ago
- 详细信息请访问:☆29Dec 7, 2013Updated 12 years ago
- Co-attending Regions and Detections for VQA.☆40Jun 2, 2018Updated 7 years ago
- The code of Graph Attention Networks for Cora, Citeseer, Pubmed and PPI☆35Jun 6, 2019Updated 6 years ago
- 模拟键盘输入进行粘贴,用OCR识图进行文本复制☆11May 26, 2023Updated 2 years ago
- Docker image for Left 4 Dead 2 (L4D2) server.☆11Oct 5, 2020Updated 5 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Code for SemEval-16 Task6 subtaskA and subtaskB.☆10Mar 31, 2016Updated 9 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- Slimebound character mod for Slay the Spire☆14Jun 30, 2020Updated 5 years ago
- ☆10Apr 30, 2024Updated last year
- ☆12Apr 2, 2025Updated 11 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- a simple vpn forked from android sdk and xiaoxia.org/2012/02/21/udpip-vpn☆13Dec 20, 2014Updated 11 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Dec 11, 2025Updated 2 months ago
- Standalone utility to encrypt files with ice encryption, that doesn't depend on Steam.☆10Aug 28, 2013Updated 12 years ago
- C++开发的web框架---正在实现功能中☆10Nov 3, 2019Updated 6 years ago
- ☆10Sep 25, 2024Updated last year
- Data and code for "Probing Spurious Correlations in Popular Event-Based Rumor Detection Benchmarks" (ECML-PKDD 2022)☆11Jun 12, 2023Updated 2 years ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆11Sep 3, 2021Updated 4 years ago
- Analyzes generic firewall rules and detects conflicts and anomalies.☆18Jan 25, 2025Updated last year
- The companion code to the paper "Model-based Causal Bayesian Optimization"☆11Nov 16, 2022Updated 3 years ago
- ☆11Feb 23, 2023Updated 3 years ago
- ☆10Oct 7, 2017Updated 8 years ago
- DOTS - Directed acyclic graph based Online Trajectory Simplification algorithm☆10Aug 7, 2018Updated 7 years ago
- Orthant-Wise Limited-memory Quasi-Newton Optimizer for L1-regularized Objectives☆10Mar 9, 2014Updated 11 years ago
- Cis Recommender☆16May 1, 2012Updated 13 years ago
- The good practice in the VQA system such as pos-tag attention, structed triplet learning and triplet attention is very general and can be…☆19Jan 23, 2018Updated 8 years ago
- 123123☆16Dec 31, 2025Updated 2 months ago
- ☆12Feb 25, 2024Updated 2 years ago
- A program to convert the given regular expression to Non Definite Automata (NFA)☆10Feb 3, 2019Updated 7 years ago
- ☆10Jan 19, 2023Updated 3 years ago
- bilibili yeah!!!!☆13Jan 16, 2021Updated 5 years ago
- these are custom recipes of nvidia nsight system post collection analysis.☆16Nov 7, 2025Updated 3 months ago
- Using sklearn _ Cluster _ Kmeans☆10Apr 11, 2018Updated 7 years ago