generative-camouflaged-spam-detector
☆11Aug 20, 2020Updated 5 years ago
Alternatives and similar repositories for generative-camouflaged-spam-detector
Users that are interested in generative-camouflaged-spam-detector are comparing it to the libraries listed below
Sorting:
- StoneSkipping model for detecting Chinese camouflaged spam☆20May 8, 2020Updated 5 years ago
- Repository containing the official code for the paper Graph-based Modeling of Online Communities for Fake News Detection.☆22Sep 25, 2020Updated 5 years ago
- Tensorflow Operation Wrapper of cppjieba (Chinese Word Segamentation)☆10Oct 21, 2019Updated 6 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- Source code for "RF-GNN: Random Forest Boosted Graph Neural Network for Social Bot Detection"☆17Apr 13, 2023Updated 2 years ago
- We have developed Symbol Demonstration Direct Preference Optimization (SymDPO) and validating its effectiveness across multiple benchmark…☆23Nov 22, 2024Updated last year
- A collection of graph contrastive learning methods.☆18Apr 1, 2022Updated 3 years ago
- Graph Injection Adversarial Attack & Defense Dataset , extracted from KDD CUP 2020 ML2 Track☆22Aug 19, 2024Updated last year
- A PyTorch implementation of our proposed loss function from the paper "SimLoss: Class Similarities in Cross Entropy"☆25Jun 18, 2021Updated 4 years ago
- ☆24Jul 27, 2023Updated 2 years ago
- Code for our AAAI2021 paper: Token-Aware Virtual Adversarial Training For Language Understanding.☆25Dec 3, 2020Updated 5 years ago
- Tensorflow implementation of Generating Sentences from a Continuous Space☆30Mar 29, 2018Updated 7 years ago
- ☆63Aug 3, 2020Updated 5 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- based on python,the first spider.☆10May 12, 2019Updated 6 years ago
- AAAI2021 COVID19-Fake-News-Detection-in-English challenge 3rd soulution☆27Jun 2, 2022Updated 3 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- The pytorch implementation of DCI (SIGIR2021).☆34Apr 20, 2023Updated 2 years ago
- This is all the Arduino code for the book in a single repository, unlike the Java code, the Arduino one is very compact, and it would mak…☆12Apr 15, 2020Updated 5 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- Identifying Nuances in Fake News vs. Satire: Using Semantic and Linguistic Cues (NLP4IF, EMNLP-IJCNLP 2019)☆11Dec 21, 2020Updated 5 years ago
- A voice spoofing detection system, based on paper presented at ICSPIS 2021☆10Feb 11, 2022Updated 4 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Coursera Natural Language Processing by Michael Collins Columbia University☆31Oct 1, 2020Updated 5 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- LaukvikCSV is a powerful API for reading, writing and querying tabular data stored in the CSV format. In contrast to other API it lets yo…☆10Feb 25, 2022Updated 4 years ago
- 学生考勤系统(PHP项目)☆10Jan 10, 2019Updated 7 years ago
- automated censorship evasion for the client-side and server-side☆11Sep 5, 2021Updated 4 years ago
- 基于Python+Flask+MySQL的数据微中台,支持数据库管理、数据收集(某乎爬虫等)等功能☆10Sep 4, 2020Updated 5 years ago
- ☆10Jan 28, 2021Updated 5 years ago
- Improved ganomaly2d and for foreign object detection☆12Sep 28, 2019Updated 6 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago