Beyond Outlier Detection: LookOut for Pictorial Explanation
☆27Nov 25, 2018Updated 7 years ago
Alternatives and similar repositories for LookOut
Users that are interested in LookOut are comparing it to the libraries listed below
Sorting:
- SedanSpot: Detecting Anomalies in Edge Streams☆25Sep 11, 2018Updated 7 years ago
- Code for the TACL paper "Nurse is Closer to Woman than Surgeon? Mitigating Gender-Biased Proximities in Word Embeddings"☆16Sep 8, 2020Updated 5 years ago
- Anomaly Mining of Entity Neighborhoods (AMEN)☆19Feb 2, 2017Updated 9 years ago
- Public (anonymized) predictive maintenance datasets from Huawei German Research Center.☆12Feb 7, 2020Updated 6 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- Implementation of NAACL'19 Strong and Simple Baselines for Multimodal Utterance Embeddings☆10Jun 4, 2019Updated 6 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- multilevel spatially-correlated variance components models☆12Jan 4, 2019Updated 7 years ago
- ☆18Aug 23, 2025Updated 6 months ago
- The AutoPath pipeline for similarity modeling on heterogeneous networks with automatic path discovery☆11Sep 12, 2019Updated 6 years ago
- Experiments on the lottery ticket hypothesis for finding sparse trainable neural networks☆10Aug 10, 2019Updated 6 years ago
- ☆10Jun 9, 2017Updated 8 years ago
- Code for "So similar and yet incompatible: Toward the automated identification of semantically compatible words" in NAACL 2015 proceedi…☆11May 11, 2015Updated 10 years ago
- Code for paper "InfoShield: Generalizable Information-Theoretic Human-Trafficking Detection" (ICDE 2021)☆11Aug 23, 2023Updated 2 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- [ECCV24] MOD-UV: Learning Mobile Object Detectors from Unlabeled Videos☆11Oct 7, 2024Updated last year
- Spearmint uses Gaussian Processes to automatically optimize hyper parameter. This is a fork of Spearmint for the deep learning community.…☆11Nov 30, 2016Updated 9 years ago
- Helps extract POIs from osm pbf files☆16Mar 4, 2015Updated 11 years ago
- Infinite relational model (IRM) for datamicroscopes☆14Oct 26, 2015Updated 10 years ago
- Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Softwar…☆10Sep 29, 2022Updated 3 years ago
- A sensitivity analysis package for causal effects☆12Mar 18, 2024Updated last year
- Robust Sparse PCA using the ROSPCA algorithm of Hubert et al. (2016)☆13Nov 30, 2024Updated last year
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ☆12Sep 26, 2019Updated 6 years ago
- Code for "Hinge-loss Markov Random Fields: Convex Inference for Structured Prediction." Stephen H. Bach, Bert Huang, Ben London, and Lise…☆11Jul 6, 2017Updated 8 years ago
- Community detection algorithms☆11Sep 2, 2016Updated 9 years ago
- Official implementation: Large Language Models are Interpretable Learners - Google☆13Jun 29, 2024Updated last year
- Bitcoin and Cryptocurrency Technologies by Princeton University (https://www.coursera.org/learn/cryptocurrency)☆17Jan 20, 2017Updated 9 years ago
- ☆12Jun 15, 2021Updated 4 years ago
- 🌍 Configuration files for Jupyter features.☆10Nov 12, 2018Updated 7 years ago
- Fast Training of Support Vector Machines for Survival Analysis☆11Dec 28, 2016Updated 9 years ago
- Public code release for the paper "Solid Geometry Processing on Deconstructed Domains" presented at SGP 2019 and authored by Silvia Sellá…☆11Jul 13, 2022Updated 3 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- PyTorch Implementation for the paper "DisCont: Self-Supervised Visual Attribute Disentanglement using Context Vectors" (ECCVW'20).☆15Oct 23, 2020Updated 5 years ago
- Code for "On the Complexity of Opinions and Online Discussions", WSDM 2019☆12Mar 25, 2019Updated 6 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- ☆16Dec 22, 2017Updated 8 years ago