☆52May 24, 2020Updated 5 years ago
Alternatives and similar repositories for OCAN
Users that are interested in OCAN are comparing it to the libraries listed below
Sorting:
- OCAN: One-Class Adversarial Nets for Fraud Detection☆24Sep 12, 2018Updated 7 years ago
- Outlier Resistant Unsupervised Deep Architectures for Attributed Network Embedding☆14Mar 24, 2023Updated 2 years ago
- Implementation of the paper Deep Graph-level Anomaly Detection by Glocal Knowledge Distillation(WSDM22)☆35Dec 12, 2021Updated 4 years ago
- ☆15Feb 24, 2016Updated 10 years ago
- UBR4CTR is the code for our proposed User Behavior Retrieval for CTR Prediction framework in SIGIR 2020.☆80Jul 14, 2021Updated 4 years ago
- ☆59Jul 10, 2019Updated 6 years ago
- GBDT结合LR的二分类模型,封装成了一个类。scikit-learn风格,可以fit和predict。有run_demo☆11Sep 5, 2019Updated 6 years ago
- [NeurIPS'23] Towards Self-Interpretable Graph-Level Anomaly Detection☆30Jul 18, 2024Updated last year
- Call Detail Record (CDR) is the information captured by the telecom companies during the Call, SMS and Internet activity. These informati…☆17Jun 8, 2017Updated 8 years ago
- ☆38May 17, 2022Updated 3 years ago
- Principal Feature Visualization for convolutional neural networks☆11Jan 28, 2021Updated 5 years ago
- 生成训练文本检测数据集☆12Jul 1, 2020Updated 5 years ago
- The official Implementation for TKDE paper "Individual and Structural Graph Information Bottlenecks for Out-of-Distribution Generalizatio…☆14Aug 6, 2023Updated 2 years ago
- Code for Graph-level Anomaly Detection via Hierarchical Memory Networks (HimNet)☆18Oct 6, 2023Updated 2 years ago
- DeepSphere for Anomaly Detection☆14May 31, 2019Updated 6 years ago
- A PyTorch implementation of DeepFD (Deep Structure Learning for Fraud Detection)☆32Oct 2, 2020Updated 5 years ago
- ☆10Jun 23, 2022Updated 3 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Implementation of TheWebConf 2021 -- Few-shot Network Anomaly Detection via Cross-network Meta-learning☆60Feb 26, 2024Updated 2 years ago
- Implementing from scratch a search engine for the French Wikipedia☆10Feb 22, 2019Updated 7 years ago
- Style transfer in text using cycle-consistent WGANs☆17Jul 11, 2018Updated 7 years ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- Implementation of well-known numerical methods.☆12Aug 8, 2021Updated 4 years ago
- GANs for class imbalanced problems☆29Jul 18, 2022Updated 3 years ago
- Implement attention model to LSTM using TensorFlow☆10Jul 3, 2018Updated 7 years ago
- Analysis code for "Topological Time-series Analysis with Delay-variant Embedding" Manuscript.☆11Nov 14, 2019Updated 6 years ago
- Code for "HINTS: Citation Time Series Prediction for New Publications via Dynamic Heterogeneous Information Network Embedding".☆14Mar 26, 2022Updated 3 years ago
- The codes of IJCAI 2021 paper "Temporal Heterogeneous Information Network Embedding"☆15Jun 10, 2022Updated 3 years ago
- [WSDM 2023] "Alleviating Structrual Distribution Shift in Graph Anomaly Detection" by Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, H…☆25Jun 2, 2023Updated 2 years ago
- Code of the paper 'Raising the Bar in Graph-level Anomaly Detection' published in IJCAI-2022☆25Jun 3, 2022Updated 3 years ago
- Distributed Training of Bayesian Neural Networks at Scale☆11May 26, 2020Updated 5 years ago
- ☆11Mar 22, 2021Updated 5 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- ☆12Jul 2, 2025Updated 8 months ago
- ☆10Jan 11, 2024Updated 2 years ago
- ☆22Mar 29, 2019Updated 6 years ago
- Source code and additional results for GLOD issues☆12Jan 19, 2023Updated 3 years ago