☆52May 24, 2020Updated 5 years ago
Alternatives and similar repositories for OCAN
Users that are interested in OCAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OCAN: One-Class Adversarial Nets for Fraud Detection☆24Sep 12, 2018Updated 7 years ago
- Outlier Resistant Unsupervised Deep Architectures for Attributed Network Embedding☆14Mar 24, 2023Updated 3 years ago
- Implementation of the paper Deep Graph-level Anomaly Detection by Glocal Knowledge Distillation(WSDM22)☆35Dec 12, 2021Updated 4 years ago
- Credit Card Fraud Detection using HMM ( Hidden Markow Model)☆11Nov 2, 2017Updated 8 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- UBR4CTR is the code for our proposed User Behavior Retrieval for CTR Prediction framework in SIGIR 2020.☆80Jul 14, 2021Updated 4 years ago
- ☆59Jul 10, 2019Updated 6 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- GBDT结合LR的二分类模型,封装成了一个类。scikit-learn风格,可以fit和predict。有run_demo☆11Sep 5, 2019Updated 6 years ago
- [NeurIPS'23] Towards Self-Interpretable Graph-Level Anomaly Detection☆30Jul 18, 2024Updated last year
- Call Detail Record (CDR) is the information captured by the telecom companies during the Call, SMS and Internet activity. These informati…☆17Jun 8, 2017Updated 8 years ago
- 生成训练文本检测数据集☆12Jul 1, 2020Updated 5 years ago
- Fight for future.☆10Oct 29, 2022Updated 3 years ago
- Official implementation of NeurIPS'23 paper "Truncated Affinity Maximization: One-class Homophily Modeling for Graph Anomaly Detection"☆46Apr 28, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The official Implementation for TKDE paper "Individual and Structural Graph Information Bottlenecks for Out-of-Distribution Generalizatio…☆14Aug 6, 2023Updated 2 years ago
- A PyTorch implementation of DeepFD (Deep Structure Learning for Fraud Detection)☆32Oct 2, 2020Updated 5 years ago
- 天池全国社会保险大数据应用+精准社保/天池精准社保第一赛季☆10Oct 14, 2017Updated 8 years ago
- Implementation of TheWebConf 2021 -- Few-shot Network Anomaly Detection via Cross-network Meta-learning☆60Feb 26, 2024Updated 2 years ago
- [WSDM'23] GOOD-D: On Unsupervised Graph Out-Of-Distribution Detection☆46Mar 2, 2023Updated 3 years ago
- [DMKD-ECMLPKDD] Personalised Meta-path Generation for Heterogeneous Graph Neural Networks (https://arxiv.org/abs/2010.13735)☆10Mar 20, 2023Updated 3 years ago
- Implement attention model to LSTM using TensorFlow☆10Jul 3, 2018Updated 7 years ago
- Analysis code for "Topological Time-series Analysis with Delay-variant Embedding" Manuscript.☆11Nov 14, 2019Updated 6 years ago
- Machine Learning with TensorFlow 1.x, published by Packt☆14Mar 2, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 基于深度学习的中文问答系统☆10Feb 13, 2019Updated 7 years ago
- Code for "HINTS: Citation Time Series Prediction for New Publications via Dynamic Heterogeneous Information Network Embedding".☆14Mar 26, 2022Updated 4 years ago
- The codes of IJCAI 2021 paper "Temporal Heterogeneous Information Network Embedding"☆15Jun 10, 2022Updated 3 years ago
- [WSDM 2023] "Alleviating Structrual Distribution Shift in Graph Anomaly Detection" by Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, H…☆25Jun 2, 2023Updated 2 years ago
- Code of the paper 'Raising the Bar in Graph-level Anomaly Detection' published in IJCAI-2022☆24Jun 3, 2022Updated 3 years ago
- Pre-computed IDF stats over all EN Wiki articles☆12Jan 30, 2020Updated 6 years ago
- Distributed Training of Bayesian Neural Networks at Scale☆11May 26, 2020Updated 5 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- The bare necessities of Pandas on the Weld runtime☆14Dec 26, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Deep Graph-based Toolbox for Fraud Detection☆753Apr 20, 2022Updated 4 years ago
- ☆19Feb 3, 2018Updated 8 years ago
- ☆22Mar 29, 2019Updated 7 years ago
- [ICCV' 23] FedPD: Federated Open Set Recognition with Parameter Disentanglement☆10Mar 25, 2024Updated 2 years ago
- Use BERT Chinese language model for Rasa v2 NLU☆15Feb 20, 2021Updated 5 years ago
- Source code and additional results for GLOD issues☆12Jan 19, 2023Updated 3 years ago
- 离线版中文标注工具,支持NER、文本分类、关系标注、对话标注等。☆14Jul 29, 2022Updated 3 years ago