StoneSkipping model for detecting Chinese camouflaged spam
☆20May 8, 2020Updated 5 years ago
Alternatives and similar repositories for stoneskipping
Users that are interested in stoneskipping are comparing it to the libraries listed below
Sorting:
- generative-camouflaged-spam-detector☆11Aug 20, 2020Updated 5 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- Research project on glyph-based Chinese character embedding. Preparing for EMNLP 2019☆11Mar 18, 2019Updated 7 years ago
- based on python,the first spider.☆10May 12, 2019Updated 6 years ago
- Source code for "RF-GNN: Random Forest Boosted Graph Neural Network for Social Bot Detection"☆17Apr 13, 2023Updated 2 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- netease实习阶段做的反垃圾文本分类☆12Mar 24, 2023Updated 2 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- Capsule networks can defend against adversarial attacks using reconstruction error☆13May 24, 2018Updated 7 years ago
- ☆10Jan 28, 2021Updated 5 years ago
- Gephi tutorials for data visualisation lecture. A Network Tour of Data Science 2019 Fall semester☆12Apr 11, 2021Updated 4 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- ☆15Feb 20, 2020Updated 6 years ago
- AI Challenger 2018 细粒度用户评论情感分析比赛 个人baseline项目☆15Oct 3, 2018Updated 7 years ago
- ☆11Dec 30, 2021Updated 4 years ago
- Fraud detection using Graph Convolutional Networks☆13May 9, 2022Updated 3 years ago
- 面向细粒度的情感分析,2018年度AI Challenger全球AI挑战赛☆15Feb 27, 2022Updated 4 years ago
- Global Greedy Dependency Parsing☆10Mar 16, 2021Updated 5 years ago
- RF^2 is a federated recommendation learning simulation framework that can simulate realistic system-induced data heterogeneity and its ef…☆13Aug 2, 2022Updated 3 years ago
- code for paper RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search☆11Jun 25, 2023Updated 2 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- [KDD 2023] Group-based Fraud Detection Network on e-Commerce Platforms☆16Feb 16, 2024Updated 2 years ago
- Listing the research works related to risk control based on GNN and its interpretability. 1. we can learn the application of GNN in risk …☆12Sep 24, 2021Updated 4 years ago
- Simple ranking metrics for PyTorch on CPU or GPU☆15Nov 20, 2020Updated 5 years ago
- ☆15Jul 26, 2022Updated 3 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- BIC: Twitter Bot Detection with Text-Graph Interaction and Semantic Consistency☆15Nov 11, 2024Updated last year
- Blazingly fast capsule networks in 75 lines of pytorch+einops☆28Sep 23, 2021Updated 4 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- codes for DUMA: Reading Comprehension with Transposition Thinking☆13Aug 10, 2022Updated 3 years ago
- Code and data used for participation in SemEval-2018 Task 3: "Irony detection in English tweets"☆17Mar 5, 2020Updated 6 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- ☆17Feb 2, 2024Updated 2 years ago
- Source code of FedPrompt☆16May 4, 2022Updated 3 years ago
- ☆14Apr 16, 2021Updated 4 years ago
- Python package to deal with PAN corpora and extract stylometric features from text documents.☆15Nov 11, 2022Updated 3 years ago
- Official repository for Jia, Raghunathan, Göksel, and Liang, "Certified Robustness to Adversarial Word Substitutions" (EMNLP 2019)☆38Dec 30, 2019Updated 6 years ago
- This is the implementation code for the WWW2021 paper "Variation Control and Evaluation for Generative Slate Recommendation"☆15Jun 7, 2021Updated 4 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago