Source code for "RF-GNN: Random Forest Boosted Graph Neural Network for Social Bot Detection"
☆17Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for RF-GNN
Users that are interested in RF-GNN are comparing it to the libraries listed below
Sorting:
- implementation of "BotPercent: Estimating Bot Populations in Twitter Communities" at EMNLP 2023, findings☆22Feb 2, 2023Updated 3 years ago
- Important papers on SocialBots detection☆26Sep 6, 2022Updated 3 years ago
- A Multi-relational Graph-Based Twitter Account Detection Benchmark☆65Jun 9, 2023Updated 2 years ago
- The code for paper "Cross Platforms Linguals and Models Social Bot Detection via Federated Adversarial Contrastive Knowledge Distillation…☆20May 3, 2023Updated 2 years ago
- BIC: Twitter Bot Detection with Text-Graph Interaction and Semantic Consistency☆16Nov 11, 2024Updated last year
- The code for the paper "BotMoE: Twitter Bot Detection with Community-Aware Mixtures of Modal-Specific Experts"☆26Sep 16, 2023Updated 2 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- Code listing for the paper 'Heterogeneity-aware Twitter Bot Detection with Relational Graph Transformers'. AAAI 2022.☆41Mar 1, 2022Updated 3 years ago
- code for paper RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search☆11Jun 25, 2023Updated 2 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- Code for ACL 2022 paper: Tackling Fake News Detection by Continually Improving Social Context Representations using Graph Neural Networks☆27Dec 19, 2023Updated 2 years ago
- A comprehensive benchmark for Twitter bot detection. CIKM 2021.☆62Oct 16, 2022Updated 3 years ago
- generative-camouflaged-spam-detector☆11Aug 20, 2020Updated 5 years ago
- Implementation for the paper: BotDGT: Dynamicity-aware Social Network Bot Detection with Dynamic Graph Transformers.☆22Jun 6, 2025Updated 8 months ago
- Code listing for the paper 'BotRGCN: Twitter Bot Detection with Relational Graph Convolutional Networks'. ASONAM 2021.☆42Nov 7, 2022Updated 3 years ago
- This repo contains the code and information for the paper "Anatomy of an AI-powered malicious social botnet"☆20Jun 12, 2024Updated last year
- We proposed social media bot detection model Botection which exploits both semantic information and user metadata to enhance task perform…☆15Aug 18, 2020Updated 5 years ago
- ☆20Jul 10, 2024Updated last year
- StoneSkipping model for detecting Chinese camouflaged spam☆20May 8, 2020Updated 5 years ago
- Official repository of TwiBot-22 @ NeurIPS 2022, Datasets and Benchmarks Track.☆244Oct 14, 2025Updated 4 months ago
- Twitter Bot or Not: Twitter bot detection with supervised machine learning models☆29Nov 7, 2022Updated 3 years ago
- Social Bot-Aware Graph Neural Network for Early Rumor Detection☆28Nov 1, 2022Updated 3 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- ☆18Feb 16, 2025Updated last year
- ☆42Oct 12, 2021Updated 4 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Using Siamese LSTM to classify repeated quora questions. Attempted pretrained bert embeddings, Word2Vec and training own embeddings toget…☆10Aug 28, 2020Updated 5 years ago
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago