Elkoumy / amunLinks
Amun is a framework that achieves privacy-preserving process mining using differential privacy.
☆12Updated 2 years ago
Alternatives and similar repositories for amun
Users that are interested in amun are comparing it to the libraries listed below
Sorting:
- PROVED (PRocess mining OVer uncErtain Data) is a library of functionalities to perform process mining on uncertain event data.☆12Updated 2 years ago
- Learning Accurate Generative Models of Business Processes With LSTM Neural Networks☆30Updated last year
- This is the complementary code repository for the BINet papers.☆27Updated 4 years ago
- Python Implementation of Decay Replay Mining (DREAM)☆27Updated 2 years ago
- A rule-based aproach to explain the output of any machine learning model☆15Updated last year
- https://arxiv.org/abs/2009.01561☆23Updated 2 years ago
- Automatic process simulation using Simpy and Pm4py.☆18Updated 4 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 7 years ago
- A new framework to generate interpretable classification rules☆17Updated 2 years ago
- Repository for the AdaptiveRandomForest algorithm implemented in MOA 2016-04☆41Updated 7 years ago
- Python Implementation for Mondrian Multidimensional K-Anonymity (Mondrian).☆174Updated last year
- python implementation of process mining and machine learning algorithm☆13Updated 6 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19Updated 6 years ago
- A software package for privacy-preserving generation of a synthetic twin to a given sensitive data set.☆53Updated 10 months ago
- Secure collaborative training and inference for XGBoost.☆105Updated 2 years ago
- R rr package for analyzing randomized response technique survey items☆13Updated last year
- Online Time Series Anomaly Detectors☆29Updated 2 years ago
- Algorithms for detecting changes from a data stream.☆118Updated 6 years ago
- Implementation of algorithms from the paper "Globally-Consistent Rule-Based Summary-Explanations for Machine Learning Models: Application…☆25Updated 3 years ago
- UCLANesl - NIST Differential Privacy Challenge (Match 3)☆24Updated 6 years ago
- Heuristics Miner in R and integrated with the bupaR framework.☆14Updated 2 years ago
- R Interface between bupaR and the PM4Py Process Mining library☆18Updated last year
- ROSE: Robust Online Self-Adjusting Ensemble for Continual Learning from Imbalanced Drifting Data Streams☆10Updated last year
- Model-agnostic Statistical/Machine Learning explainability (currently Python) for tabular data☆9Updated 3 months ago
- Histogram Based Outlier Score (Python)☆16Updated 7 years ago
- An R package for implementing augmented network log anomaly detection procedures☆22Updated 5 years ago
- Supplementary material for KDD 2018 workshop "DCSO: Dynamic Combination of Detector Scores for Outlier Ensembles"☆19Updated 6 years ago
- Cyber Anomaly Detection using RNN Language model☆9Updated 7 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆120Updated last year
- ☆18Updated 2 years ago